Chapter 5 - Application Security

12345678910111213141516171819
Across
  1. 4. An iterative and flexible approach to software development and delivery.
  2. 7. A condition where a program fails to release unused memory, reducing performance.
  3. 8. A Windows feature that limits application privileges to prevent unauthorized changes.
  4. 9. A condition where a calculation exceeds the max value of an integer type.
  5. 10. A security feature that randomly arranges memory addresses to prevent exploits.
  6. 11. Analyzing source code to find and fix security vulnerabilities.
  7. 12. A vulnerability that allows attackers to run arbitrary code on a remote system.
  8. 14. An attack technique that accesses restricted files by manipulating file paths.
  9. 17. The process of planning, creating, testing, and deploying secure software.
  10. 18. Best practices for writing software that avoids introducing security flaws.
  11. 19. Testing software with full access to internal logic and source code.
Down
  1. 1. An error that occurs when a program tries to access memory through a null pointer.
  2. 2. A linear and sequential software development methodology.
  3. 3. Identifying and evaluating potential security risks in an application.
  4. 5. Testing software without knowing its internal code or logic.
  5. 6. Checking and filtering user input to prevent malicious data processing.
  6. 11. A method of handling software errors without crashing the system.
  7. 13. An isolated environment used to run and test code safely.
  8. 15. A type of Flash-based browser cookie stored locally on the user's device.
  9. 16. A technique that tests software by inputting large amounts of random data.