Across
- 2. The malicious code or software that looks legitimate but can take control of your computer.
- 5. The attack which consists of insertion of a SQL query via the input data from the client to the application.
Down
- 1. The process or action of proving or showing something to be true, genuine, or valid.
- 3. The function of specifying access rights/privileges to resources.
- 4. The authentication in which the user state is stored on the server's memory
