Across
- 3. bombs
- 4. of vulnerability,
- 8. engineering,
- 9. overflow,
- 10. attack methods,
- 11. (MITB),
- 12. force attack,
- 14. (DoS) attacks,
Down
- 1. viruses,
- 2. (MITM) and
- 4. horses,
- 5. injection,
- 6. (software and hardware),
- 7. scripting (XSS),
- 13. day attacks/
