Which of the following security applications is used to secure a database from unauthorized accesses in a network infrastructure?
Antivirus
Anti-Malware
Anti-Spoofing
Firewall
Submit