Cybersecurity Tech Terms, Part 1

Edit Answers
NMYZERQZRTNEMEGNIRFNITHGIRYPOC QPELECTRONICEAVESDROPPINGCWWER QFJDSZIKEKVLRYRGKELDRXXEHQODVH QGLWOHKJWRXTLSNIFFINGZUNJRTLFM MESRECTMLCATFISHINGOKHNTMFWEQC ECTFCYOSTQOWMDFUZQKUXVFZGVVHDI PZRUIBOHMDJRDGQISDAHKMQVCECUBC HGOWKERKZFAYIAPLAGIARISMTOXTBA CDNUHRXVZHXUKCYBERCRIMEODMEMYN ASGXBVTHPESROHNAJORTAEPBPFAKWT EUPXSAZODTAHFINNSKCSRNRJUPCCAI RRAEUNRYBDATASKIMMINGXNASELDRM BISXRDSPOMUUACUSTOZWCFDKWGISDA AVSTIAKSABGSLFRHJWSLXZLLDYBHRL TZWFVLWVXNOZUMNQDELKGUQMTOPSIW ABOEIIOLOJZEQDXHOFLKBHMRODGSVA DLRHTSTEAYYCAVIRPFONOISAVNIEIR QBDTNMCJPMGNIREENIGNELAICOSHNE JTSOAAKSADDOSTRSCOGNIFOOPSBTGL TDRYKROWTENETAVIRPLAUTRIVDCUDR
1.
Bot
2.
DDoS
3.
BulkSpam
4.
Virus
5.
Malware
6.
Worm
7.
TrojanHorse
8.
Rootkit
9.
Spyware
10.
Adware
11.
Plagiarism
12.
CopyrightInfringement
13.
InvasionOfPrivacy
14.
ElectronicEavesdropping
15.
Pharming
16.
DataSkimming
17.
WarDriving
18.
CyberCrime
19.
Antivirus
20.
Antimalware
21.
Spoofing
22.
VirtualPrivateNetwork
23.
DataBreach
24.
StrongPasswords
25.
catfishing
26.
theft
27.
sniffing
28.
cyberVandalism
29.
socialEngineering