Cybersecurity Tech Terms, Part 2

Edit Answers
DOPMHLCLIRCZZTZJWTMTXKKKXEXPKT IBGTOLSJETRTDYHORNQATTHEFTCSJS HJSMGLOTTQNLEHAJSIWJXQOCXPJGVU RKUXZACUXAVCYBERVANDALISMTACIP ALRBQWIGHZHYUHSZGNIHSIFTACUUNP NYIOUEAYBCZKNXYTMTOQXOERSWIPOQ SOVOARLSZLAKCCPOJTROLLINGTEZCI OMOTRIESNWIEEAEUZYRTSIWGXFHTUM MRRSAFNDEDWMRMLAEOOQSECURITYLC WCCENEGEWITHLBGBNVLDPUUWHELUAZ AFACTRIQNZKLINASDROWSSAPGNORTS RDMTIANDHNAOITQTEZEADXPPRDSNIE EUVONWEGLNBFOAELANFOVFAXAMSYOU LLHRITESFHFGVCNHUDBOTNETYLHDNE KXSVNFRWWIHTUWCLAUKVYTSUHWLFUJ LPGIGOIENCRYPTIONTOFVYGDAMZVAO ASZRTSNSAYCXKSCRIPTSUOMNTUEALF MDDUGOGBCHNXFGFZMRRQVBSFZLBRPS YTMSTEPGQVTMCTSWJGDTMPMXRGHOLJ WTYOYFTPJEMAILVIRUSWRQJTUNPRLN
1.
DataBreach
2.
StrongPasswords
3.
BootSectorVirus
4.
Scripts
5.
MacroVirus
6.
EmailVirus
7.
Cookies
8.
Security
9.
Catfishing
10.
Theft
11.
Sniffing
12.
cyberVandalism
13.
SocialEngineering
14.
Trolling
15.
Encryption
16.
BotNet
17.
Quarantining
18.
Inoculation
19.
SoftwareFirewall
20.
GrayHat
21.
WhiteHat
22.
BlackHat
23.
Ransomware