Cybersecurity Di Vinci

Edit Answers
FOGHYCTHZQKZDCGYVYNN EIFXLWZTKYRUAQFIZRZM YJJLRZKTGGWMUOGYBFKU LTLLXNKJFXKHHSFAJKJN MMSAPASSWORDVATUBTRO TOEWHGZUWENIDHRTPIAY TSCEWPIKKQEPHOTVKYUW FXURIPPICCLLCDVCQKTM OLRIOAEJARRVZXXNEFHH BTEFDPDVWTXWZDKJAUEE IRSDXUZFAULDTDVFVENF TPURNCHTHDCOBYVAWRTR LYAJTBYBSNYZRVWCLAIE EHDLDMXXTENDEDHLFWCH GXZRNZZYZFZMURSOQLAP BJYKPXRAYEFNKNSBVATI PHISHINGDDNURKNTHMIC DPTSOZUHNJWVZXMHMYOW ORIZCNTTUQLJHBXJISNP VIRUSOIXIZFSCGBQOJEU
1.
To protect systems from attack
2.
An algorithm for encryption or decryption
3.
Keeping data safe from unauthorized access
4.
A malicious software
5.
Verification of a user's identity
6.
A program that replicates itself and spreads to other computers
7.
A barrier designed to prevent unauthorized access
8.
An attempt to trick users into revealing sensitive information
9.
A secret word or phrase for access