The method of protecting programs, networks, and systems from digital attacks is commonly known as __________.
Cryptology
Cryptography
Cybersecurity
Cryptanalysis