Across
- 1. Cross Site Request Forgery
- 3. ______ is a popular tool used for discovering networks as well as in security auditing.
- 5. Compromising confidential information comes under ________
- 6. _______________ is time based SQL injection attack.
Down
- 2. What is simplest form of memory protection introduce in the single authentication system
- 4. Which happens first authorization or authentication?
