Malware Word Search

Edit Answers
THIXEIRBLDSBSNKG-YKP EXSQVLFVJWVHSCMPKWKF FDTSCZCDUHSGBAGWMKIB JOTY-WYGJTOALQSHRRDH BFHUIUUUQBYWUHMOEHYM S-SJQNLAYUAUTVYWIFGM -IMILSPNHRKPQBATNXPY HKDUMPHRE-UEPLUNCZNT VILAICOSKDGRL-XDIBOI PSHTNEMWMZDAIDFADCPL DPCXZNZUNMJWNPBTENFI XJTAGCISMYZMTUNANTSB EWAS-ROVOASORYFMTIGA ZSPILYFYNDCSUTXLYJNR DODVJPYMU-FNSICHXBIE E-GTZTRVKOEAIRKKWFHN NLSEEIDZERKROUZQP-SL IOSDGOPEDEUYNCKHYFIU AKGKJNUHWZOJZESXNDHV LWROTCAF-OWTESBJLJPD
1.
Malware
2.
Phishing
3.
Ransomware
4.
Firewall
5.
Encryption
6.
Vulnerability
7.
Detection System (IDS)
8.
Authentication (2FA)
9.
of Service (DoS)
10.
Exploit
11.
Engineering
12.
Management
13.
Breach
14.
Information and Event Management (SIEM)
15.
Response