Module 5 Unit 1b Application Security
Across
- 4. Ensures that only authorized users gain access to it
- 6. Sensitive data must be _________
- 7. Used to validate user permissions
- 8. This form of testing analyzes code during the development process
Down
- 1. Analysis of running code would be called _______ testing
- 2. Designed for Mobile OS environments
- 3. An external expert hired to attempt to gain access to a system
- 5. Record of access