Answers
Software designed to detect and destroy computer viruses
The process of securing a system by reducing its surface of vulnerability, which is larger when a system performs more functions
Encrypting files and databases to protect their contents in case of theft
Encrypting data transmitted across the web to protect against attacks such as packet capture and man-in-the-middle (MITM) attacks
The process of creating and storing copies of data that can be used to protect organisations against data loss
A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
The process of converting information or data into a code, especially to prevent unauthorised access