Across
- 3. A type of software that records keystrokes on a computer, often used for malicious purposes
- 6. A security approach that assumes breach and verifies each request as though it originates from an open network
- 9. A comprehensive security solution that provides a defense against a variety of threats for endpoints
Down
- 1. A strategy for ensuring that only trusted software can run on systems
- 2. A security measure that involves checking the health of endpoints before allowing access to a network
- 4. A type of attack that involves injecting malicious code into a program or system to compromise it
- 5. A security incident in which sensitive, protected, or confidential data is copied, transmitted, or used by an individual unauthorized to do so
- 6. A type of malware that is designed to take advantage of a security hole before it is known
- 7. A type of software designed to protect endpoints from malicious activity
- 8. A type of security threat in which an attacker seeks to damage or destroy a computer network or system
- 10. A type of security software designed to detect and prevent unauthorized use and transmission of confidential information
