assgn1 asl

123456
Across
  1. 1. Cross Site Request Forgery
  2. 3. ______ is a popular tool used for discovering networks as well as in security auditing.
  3. 5. Compromising confidential information comes under ________
  4. 6. _______________ is time based SQL injection attack.
Down
  1. 2. What is simplest form of memory protection introduce in the single authentication system
  2. 4. Which happens first authorization or authentication?