Cyber Vision

Edit Answers
ESCALATIONQJAYL-SOIUQO ROOTKITHIJACKINGNZFXXB DCIPHERTEXTQLDNPISNZSF PENETRATIONLUJCOFCSIIU METSPYWAREEXGJWLFRTTSS SRLRKYJIONPNCGZYIYENYC ZASRROAINRIANJFMNPGALA BWLYAPBAJKQIT-IOGTAJAT BLRAYNHOLQFGQZRRHONONI HAJEMCSATOIXFDMPEJORAO YMKSEIWOOMZSALWHJAGTTN PMRDQEZPM-AELTAIGCRZPJ EDI-RBSNUWTSRXRSNKAHYN RSXIP-BKMTANTOEMIIPRRL JHFCMPWEEVSRWE-RMNHFCG AWHJDJLYBTHCEWRDRGYBXT CKEYLOGGERHPQUARANTINE KJWLHSANDBOXINGNHYMAIN IKNMDTTHREATWAREPPBPMW NRRLQOEXFILTRATIONQWMH GOPABFAZBACKDOORAIRGAP WHEURISTICSCBRUTEFORCE
1.
Sniffing
2.
Firmware
3.
Salami
4.
Quarantine
5.
Airgap
6.
Hyperjacking
7.
Cryptanalysis
8.
Steganography
9.
Polymorphism
10.
Ransomware
11.
Obfuscation
12.
Keylogger
13.
Backdoor
14.
Penetration
15.
Botnet
16.
Trojan
17.
Spoofing
18.
Rootkit
19.
Cryptojacking
20.
Malware
21.
Wormhole
22.
Firewalking
23.
Sidechannel
24.
Botmaster
25.
Zero-day
26.
Sandboxing
27.
Pharming
28.
Exfiltration
29.
Bruteforce
30.
Heuristics
31.
Escalation
32.
Hijacking
33.
Threatware
34.
Ciphertext
35.
Keypair
36.
Spyware