Across
- 2. to steal sensitive information
- 4. malware
- 8. protection of computing systems and data that these systems store
- 10. set of rules
Down
- 1. the virtual and dynamic space created by the machine clones
- 3. protecting info.from inauthorized parties
- 5. attack data to web application
- 6. malicious software
- 7. attack uses trial & attack method
- 9. automated process