Lecture 3

1234567891011121314
Across
  1. 3. Statements
  2. 6. SQL Injection
  3. 7. Request Forgery
  4. 11. Misconfiguration
  5. 12. SQL Injection
  6. 14. Deserialization
Down
  1. 1. Logging and Monitoring
  2. 2. Sanitization
  3. 4. Queries
  4. 5. Scripting (XSS)
  5. 8. Injection
  6. 9. Data Exposure
  7. 10. Authentication
  8. 13. SQL Injection