Across
- 2. Property of being accessible
- 4. Violation of the security
- 7. The process or action
- 9. The alternative way to access software
- 10. An internet traffic
Down
- 1. A security mechanism
- 3. Property of accuracy and completeness
- 5. Property that information
- 6. A cyber attacker who uses software
- 8. End-user devices
