Safe to Speed
Across
- 7. Without proper input _____, malicious actors can send a malicious input into your web application form to inject malicious code to extract sensitive data from your database.
- 9. Performing threat _____ at the start of your project will give you insight into your system's risk profile.
- 10. Systems infected by malicious actor can be used to partake in a _____. This allows the malicious actor to use your infected system to conduct attacks to achieve their goals.
Down
- 1. _____ programs attempt to utilise your system's compute resource (Without your knowledge) to mine for cryptocurrencies.
- 2. Regular review of _____ accounts ensures that no unauthorised users are misusing the accounts outside the bounds of the system owner's knowledge.
- 3. Doing system _____ will ensure that your systems are protected from the most basic and common attacks.
- 4. It's important to understand potential vendor's cybersecurity _____ to evaluate if they have both innovation and cybersecurity best practices in mind.
- 5. Security _____ helps identify business logic flaws and bugs in your application code.
- 6. This provides you with a simpler and balanced means of ensuring cybersecurity best practices during a proof of concept/value or minimum viable product stage.
- 8. _____ are often leaked on public code repositories due to developers using loosely configured code repositories.