Cybersecurity Tech Terms, Part 4

Edit Answers
OQQTFEHTYTITNEDICWSFOUMXLTJKXK RKBUFPPXKVNQMKYYFNDDBUVBDURCUB HHOHAGMQHVAIWOXTEOBMRBMOBEMITG OECHRZEJIANTISPAMIYTOEGIKFWJUC MGRGNIHSIHPRAEPSPTWOWYPPMGDPKT ENGAECAPSREBYCWHRAZRSWDQEPJEON TINYWWGQFMWTCFQFICRJEKSPOOFING ITINPYFGWGEIYPBHGIOIRVKHHLYTXQ TXPEYVPCSMIYBOCYLTOTPSCANNINGS LEPLRRJSFRPKEIRRWNDCLNFJKSRHHO ETAOYAXZICUGRQCEQEKIUFBEGMOCZD FEZGWGWUFTSBSOWXQHCCGRLIDSNULM RRRIAPIEMQNAECBOPTAFICRURVCCMS APECPRLURQPACJDAXUBXNLROZAFACH UMPAHXMIQAMGUKBYIASWSXFRDNCBMX DRULHYCBQMCGRSOFTWAREUPDATESGS UZSPJFIPMZPSISURIVCIHPROMYLOPG WYDOAMOHFHAETSUYETRAPDOORIJXJI RBPRJSEPSLTZYULLAWERIFERAWDRAH JPSTSLANIMIRCREBYCDUTQVNMFAQVE
1.
AntiSpam
2.
BrowserPlugIns
3.
HardwareFirewall
4.
AntiSpyware
5.
Cybersecurity
6.
SoftwareUpdates
7.
Scanning
8.
SuperZapping
9.
Spoofing
10.
TimeBomb
11.
TrapDoor
12.
Scams
13.
IdentityTheft
14.
HomeTitleFraud
15.
Scareware
16.
PolymorphicVirus
17.
Authentication
18.
Backdoor
19.
DoS
20.
SpearPhishing
21.
PreTexting
22.
Cyberspace
23.
CyberCriminals
24.
LogicalPort