Cybersecurity Tech Terms, Part 2

Edit Answers
KVWXIFUZCXZZHYZZYBOOFTTOHRCVGK GQQNQVNFEWXXMPPKROWTENEIBMOZZE NISVWKVQREIOSLWWZBFFSQSCIHTEJH IDECMDOOUCNDRNBUNTVBTTFKGBKSDW TBMTUCVMWUOXJAIRANSOMWAREQMBTC IGUYFAVAQECZYUVFFGHHGPVLGYEYHW EONIDDIICPUBYGJLFFTUCZDGCWUVGX FSPINWOFJKLGHNOCMIRDSGNXKAMTIR RDXELAJQAEAJJIBBOTNETISRUBCHRF EBRUHLVUSZTCPKQPVPEGHEANYMYEYV TTWLVDOANCIKTCYAJTWSTDEAAEUFPR NKEZVEORWSOCIALENGINEERINGPTOE UFGYXGWATVNOPHKONFGNIKCAHPRVCG OEKOORHNDBPQLSOFTWAREFIREWALLG CUACFAITAHKCALBAZKNWHLBALTGMNO BBYGKYTIMMBBJSCIHTERETUPMOCFTL APPGOHENUYTREPORPLAUTCELLETNIY UEJRMAHINYFJMKTUVEXRXGFUSCEWRE UQLNKTANQQAYHMGXEKNOITPYRCNEBK JNMBINTGCFCYBERVANDALISMNJLUTD
1.
catfishing
2.
theft
3.
sniffing
4.
cyberVandalism
5.
socialEngineering
6.
trolling
7.
encryption
8.
botnet
9.
quarantining
10.
inoculation
11.
softwareFirewall
12.
grayhat
13.
whitehat
14.
blackhat
15.
Ransomware
16.
ZombieNetwork
17.
Hacking
18.
DarkWeb
19.
Keylogger
20.
Ethics
21.
ComputerEthics
22.
Copyright
23.
IntellectualProperty
24.
Hacking
25.
Counterfeiting