Software Security
Across
- 5. Isolating system components to contain security breaches.
- 7. a power to extend the software on certain implementations considering future growth.
- 8. A flaw or weakness that can be exploited to cause harm.
- 9. Injection Common attack injecting malicious code into database queries.
Down
- 1. Ensuring information is accessible only to authorized users.
- 2. arises in software due to uncontrolled expansion in volume and enormous capacity of storage.
- 3. The process of verifying the identity of a user or system.
- 4. Security model enforcing “no read-up” and “no write-down” rules for confidentiality.
- 6. Average time to fix a discovered vulnerability (abbreviation).