Application Security

12345678910111213
Across
  1. 2. Injection attack that tricks a database.
  2. 5. Secret string used for login.
  3. 7. Verifying who is accessing the system.
  4. 8. Confidence that users have in an application.
  5. 9. Scrambling data so it can’t be read if stolen.
  6. 10. Writing software instructions for a computer.
  7. 11. Tool that scans code before deployment.
  8. 13. Blocks attacks on applications.
Down
  1. 1. Checking user input for safety.
  2. 3. Improves or secures software.
  3. 4. List of the top 10 application risks.
  4. 6. Decides what a user can do.
  5. 12. A small software fix.