Cybersecurity Tech Terms, Part 6

Edit Answers
QUSUBIBQKLFZKRETINALSCANNINGAY CNOITPYRCNEYEKETAVIRPCUTFCKECD BYTIRUCESTNIOPDNEJUXIWOHRYACCX TLJTPDURENNACSMLAPBMJPDSENNAEW FACIALRECOGNITIONDRAYOXMKDOFSM LVVGNINNACSTROPRTXAEZLIACGGRSW KRESWORBROTAPJPUTGNTBOKYOMUUCK BASTIONHOSTWMEPYZOJKAGCMLIFSAE CLOUDATTACKSZNCFHJKRRBXIBHPKRP PHYSICALPROTECTIONJDDBRODZYCDU THREATINTELLIGENCEXQBOCEAWIARR FFOYSURIVCITSIRUEHLIJXEGANCTEI WVERIJPOLFGYTILAITNEDIFNOCATAD MZWDUVZFZNPACKETFILTERINGMHADU YNOITPYRCNEYEKCILBUPUWZOPLLNEV ZPQEPNMMHRETUORGNINEERCSDDIMRW LLRDARKWEBQHRENNACSTNIRPREGNIF KPGNINEERCSTEKCAPNQLNHBAUXEQRW LASREMMIKSTHREATMITIGATIONAHII LDREPFRZSFYGPEBSECURITYTHREATQ
1.
PublicKeyEncryption
2.
HeuristicVirus
3.
HoneyPot
4.
ScreeningRouter
5.
PacketScreening
6.
BastionHost
7.
PalmScanner
8.
Skimmers
9.
RetinalScanning
10.
AccessCardReader
11.
FacialRecognition
12.
FingerprintScanner
13.
PhysicalProtection
14.
SecurityThreat
15.
ThreatMitigation
16.
DataConfidentiality
17.
PortScanning
18.
PrivateKeyEncryption
19.
PacketFiltering
20.
AdBlocker
21.
TorBrowser
22.
DataBreach
23.
DarkWeb
24.
EndPointSecurity
25.
ThreatIntelligence
26.
CloudAttacks
27.
AttackSurface