Cisco 4

12345678910
Across
  1. 3. A type of software that records keystrokes on a computer, often used for malicious purposes
  2. 6. A security approach that assumes breach and verifies each request as though it originates from an open network
  3. 9. A comprehensive security solution that provides a defense against a variety of threats for endpoints
Down
  1. 1. A strategy for ensuring that only trusted software can run on systems
  2. 2. A security measure that involves checking the health of endpoints before allowing access to a network
  3. 4. A type of attack that involves injecting malicious code into a program or system to compromise it
  4. 5. A security incident in which sensitive, protected, or confidential data is copied, transmitted, or used by an individual unauthorized to do so
  5. 6. A type of malware that is designed to take advantage of a security hole before it is known
  6. 7. A type of software designed to protect endpoints from malicious activity
  7. 8. A type of security threat in which an attacker seeks to damage or destroy a computer network or system
  8. 10. A type of security software designed to detect and prevent unauthorized use and transmission of confidential information