Across
- 2. attack use the trial-and-error method
- 3. to steal sensitive information
- 4. malware to replicate itself
- 5. unexcepted changes in computer
- 7. distribution of information
Down
- 1. cyber architecture
- 2. automated process
- 3. set of rules
- 6. protecting info. from unauthorized parties
- 8. malicious spread through files
