Application Security
Across
- 2. Injection attack that tricks a database.
- 5. Secret string used for login.
- 7. Verifying who is accessing the system.
- 8. Confidence that users have in an application.
- 9. Scrambling data so it can’t be read if stolen.
- 10. Writing software instructions for a computer.
- 11. Tool that scans code before deployment.
- 13. Blocks attacks on applications.
Down
- 1. Checking user input for safety.
- 3. Improves or secures software.
- 4. List of the top 10 application risks.
- 6. Decides what a user can do.
- 12. A small software fix.