Cyber Security

12345678
Across
  1. 2. attack use the trial-and-error method
  2. 3. to steal sensitive information
  3. 4. malware to replicate itself
  4. 5. unexcepted changes in computer
  5. 7. distribution of information
Down
  1. 1. cyber architecture
  2. 2. automated process
  3. 3. set of rules
  4. 6. protecting info. from unauthorized parties
  5. 8. malicious spread through files