Cyber security

123456
Across
  1. 2. made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information
  2. 5. a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules
  3. 6. designed to detect and destroy computer viruses.
Down
  1. 1. body of technologies, processes and practices designed to protectnetworks, computers, programs and data from attack, damage orunauthorized access
  2. 3. are small files that Web sites put on your computer hard disk drive when you first visit
  3. 4. the activity of defrauding an online account holder of financial information by posing as a legitimate company.