Chapter 18 Layers of Defense Againist Malware
Across
- 4. otherwise known as Apps or Programs
- 5. _________ software functions kind of like a guard dog
- 6. The layer of Defense between your computer and the Internet this layer is called a _____.
- 7. ________ cover the known weaknesses in a program so that attackers can't exploit them.
Down
- 1. The person is known as the _______.
- 2. Layer 1
- 3. Arm yourself with ___________
- 8. None of these layers is very effective on its own. But taken together they constitute a strong ______ defense strategy.