Across
- 3. a code injecting method used for attacking db of a system.
- 5. a complementary mechanism to OpenID and is used to create SSO systems
Down
- 1. Which is the least secure method of authentication
- 2. What is Stuxnet
- 4. a popular tool used for discovering networks as well as in security auditing.
