Cybersecurity Di Vinci

Edit Answers
QRCSDFRGBILEHTAEVKWJ DXRDQIUXXQAMEYCEDJQR XSHKKEFOGHYCTHZQKZDC GYVYNNEIFXLWZTKYRUAQ FISZRZMYJJRZKTGGWMUO GYEBFKULTLXNKJFXKHHS FACJKJNMMVATUBTROTOH GZUUWENIDHRTPIYTSWPI KKRQEPHOTVKYWFXIPPIC CLELCDVCQKMOLOAEJARR VZXXNEFHBTDPDVWTXWZD KJAUEIRSDDXUZFAULDTR DVFVTPURNNCHTHCOBYVE AWLYAJTBYEBSYZRVWCLH EHDLDMXXTFNDEDHLFGXP ZRNZZYZZMEURSOQBJYKI PXRAYFNKNDSBVDNURKNC THDPTSOZUHNJWVCZXMHM YWORIZCNTTUQLJHBXJIS POIXIZFSCGBQOJEUXUES
1.
To protect systems from attack
2.
An algorithm for encryption or decryption
3.
Keeping data safe from unauthorized access