Software Security

123456789
Across
  1. 5. Isolating system components to contain security breaches.
  2. 7. a power to extend the software on certain implementations considering future growth.
  3. 8. A flaw or weakness that can be exploited to cause harm.
  4. 9. Injection Common attack injecting malicious code into database queries.
Down
  1. 1. Ensuring information is accessible only to authorized users.
  2. 2. arises in software due to uncontrolled expansion in volume and enormous capacity of storage.
  3. 3. The process of verifying the identity of a user or system.
  4. 4. Security model enforcing “no read-up” and “no write-down” rules for confidentiality.
  5. 6. Average time to fix a discovered vulnerability (abbreviation).