Chapter 18 Layers of Defense Againist Malware

12345678
Across
  1. 4. otherwise known as Apps or Programs
  2. 5. _________ software functions kind of like a guard dog
  3. 6. The layer of Defense between your computer and the Internet this layer is called a _____.
  4. 7. ________ cover the known weaknesses in a program so that attackers can't exploit them.
Down
  1. 1. The person is known as the _______.
  2. 2. Layer 1
  3. 3. Arm yourself with ___________
  4. 8. None of these layers is very effective on its own. But taken together they constitute a strong ______ defense strategy.