CYBER SECURITY

12345678910
Across
  1. 2. to steal sensitive information
  2. 4. malware
  3. 8. protection of computing systems and data that these systems store
  4. 10. set of rules
Down
  1. 1. the virtual and dynamic space created by the machine clones
  2. 3. protecting info.from inauthorized parties
  3. 5. attack data to web application
  4. 6. malicious software
  5. 7. attack uses trial & attack method
  6. 9. automated process