Across
- 1. malicious software
- 7. protection of computing security
- 8. cyber architecture
- 9. malware
- 10. steal sensitive information
Down
- 2. protecting info from unauthorised party
- 3. authorised parties able to access
- 4. set of rules
- 5. trial and error
- 6. distributive information