Security CW

12345678
Across
  1. 5. A type of security testing that simulates an attacker with knowledge of the system ( ____ testing)
  2. 6. A security principle that means users should have access only to the resources they need (least ____)
  3. 8. A type of vulnerability that allows attackers to execute code remotely (remote code ____)
Down
  1. 1. A type of security control that can help prevent cross-site scripting attacks (input ____)
  2. 2. A type of security control that can help prevent buffer overflow attacks (stack ____)
  3. 3. A type of security control that can help prevent cross-site request forgery attacks (____ token)
  4. 4. A type of vulnerability that can allow attackers to access sensitive information (____ injection)
  5. 5. A common technique used to prevent SQL injection attacks (____ parameters)
  6. 7. A type of security testing that tries to break an application by feeding unexpected input (_____testing)