1
Techniques to decode secret data
2
Encoding data so that unauthorized users can´t read it
3
A....... protects a company intranet fron outside attacks
4
Users have to enter a........ to gain access to a network
5
It´s designed to obtain personall information without the user´s permission
6
This type of software is available free of charge but protected by copyright
7
Can infect your files and corrupt your hard drive
8
A ....... is a person who uses their computer skills to enter computers and networks illegally