Network security

Edit Answers
CHWAIFNWJHXOOWPJWSAC HKLFXCUBGTPPNHZHKMVB OCATJNZQIYTIRGETNIIV UWSJEAGKMOMYCUKHHGCR XDMEPSULRDMKEHJCUXEJ KIZDIRQTSAYELBAWBGHT XLISMGUDHLNDTAJNNZIZ ZHBORSOEEEZSARNZNXGT HYCJTBRLHKNDOIIRQAIX KCRIYFHGOLETEMRCEZWS LSEPTIEWZPNVIVWTSTEG TLLAWJCTQOOSYCIAYBEQ JMHHKTQRTRETRFACRMXM GDGCAJHWWREVWOJTEEYX PRYTTGZAXMELISSAIPIE CTWXPIOEXVDUPDEYFOBE KWGPLIWGMYMXZQPTAHNY OYRLYJDSGNIKROWTENFW SIYRCEPPNUEUQOTZFQPO REKORYEINIIZUDZPOZVJ
1.
part of the CIA triad
2.
deals with different types of hackers
3.
our everyday use
4.
old device rarely used in networking
5.
was a macro virus
6.
prevents you to access your device
7.
networking device
8.
part of wanna cry
9.
second part of the wanna cry
10.
iris, fingerprints
11.
derived from the work triangle
12.
forever
13.
unaltered info
14.
group of computers
15.
part of red hat
16.
mesh, ring and others