Cybersecurity Tech Terms, Part 2

Edit Answers
NYTREPORPLAUTCELLETNIPARY PLTCZYGNINITNARAUQMJVFGDJ SRDAVCOMPUTERETHICSENDQCT ACHTCXPRENCRYPTIONPFXXBUB AOAFDFGCOUNTERFEITINGCQSL SPCIJINOCULATIONEMVTTIKNA RYKSAWSOCIALENGINEERINGPC ARIHATUCUGNTRDCLWHITEHATK NINIVWUNNZOMBIENETWORKVEH SGGNTGMIUHOPBRUMGTPGZYDYA OHKGZIFYQEWSOQKNXNGRAYHAT MTAUQFYOAQCQTPFPOQIEYZJHW WZICICYBERVANDALISMLESOGJ AWMNKRGVCODDEGRCPZYYLNVIP RXSMBIHXFLZYTETUTZZXOOYOQ EAFQERNWPVFJSOVEGTHPACRVR CPAXCBGGMYCNVWYHTAFTQWFTO TEBREGGOLYEKWHFUSUYEDNNUS BCXSCIHTEZYJZNOFLXHIHQTDA QAMQMSPIALDHLBEWKRADKTPBU
1.
catfishing
2.
theft
3.
sniffing
4.
cyberVandalism
5.
socialEngineering
6.
trolling
7.
encryption
8.
botnet
9.
quarantining
10.
inoculation
11.
grayhat
12.
whitehat
13.
blackhat
14.
Ransomware
15.
ZombieNetwork
16.
Hacking
17.
DarkWeb
18.
Keylogger
19.
Ethics
20.
ComputerEthics
21.
Copyright
22.
IntellectualProperty
23.
Hacking
24.
Counterfeiting