Across
- 2. A unique string of data or code that identifies a specific virus. Antivirus software uses these signatures to recognize and eliminate known malware by scanning files.
- 6. A program designed to detect, prevent, and remove malware (including viruses, worms, and trojans) from computers and networks.
- 7. The process of inspecting data packets during transmission and allowing or blocking them based on security rules. Firewalls use this to prevent unauthorized access and protect against threats.
- 9. A security application that monitors and controls incoming and outgoing network traffic based on predetermined security rules, acting as a barrier between trusted and untrusted networks.
- 10. The practices and technologies used to protect networks from unauthorized access, misuse, or attacks, significantly enhanced by antivirus and firewall software.
Down
- 1. A network security technology that monitors network traffic for suspicious activity and potential threats, alerting administrators to possible security breaches.
- 3. A method employed by antivirus software to detect unknown viruses by analyzing the behavior and characteristics of suspicious files, aiding in identifying new or modified malware.
- 4. Malicious software designed to harm, exploit, or otherwise compromise computer systems and networks, including viruses, worms, trojans, and spyware.
- 5. Data packets leaving a network; rules can allow or block traffic based on destination addresses.
- 8. Data packets entering a network; rules can restrict access based on specific ports or IP addresses.
