Abhishek Dhule -24

12345
Across
  1. 2. The malicious code or software that looks legitimate but can take control of your computer.
  2. 5. The attack which consists of insertion of a SQL query via the input data from the client to the application.
Down
  1. 1. The process or action of proving or showing something to be true, genuine, or valid.
  2. 3. The function of specifying access rights/privileges to resources.
  3. 4. The authentication in which the user state is stored on the server's memory