Across
- 2. made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information
- 5. a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules
- 6. designed to detect and destroy computer viruses.
Down
- 1. body of technologies, processes and practices designed to protectnetworks, computers, programs and data from attack, damage orunauthorized access
- 3. are small files that Web sites put on your computer hard disk drive when you first visit
- 4. the activity of defrauding an online account holder of financial information by posing as a legitimate company.