SQL INJECTION
Across
- 3. SQL Injection Uses statistical inference to gain access to confidential data
- 7. acceptable characters and reject or encode special characters that could be used in injection attacks
- 8. Which type of SQL Injection allows attackers to extract sensitive information or modify the database itself.
- 9. web page vulnerability that lets an attacker make queries with the database.
- 10. Which of the following field is susceptible to SQL injection?
Down
- 1. Which type of SQL Injection Attackers exploit error messages generated by the web application
- 2. Attack which stole personal records belonging to students, faculty, and staff.
- 4. Out-of-band SQL Injection Allows attackers to ___________ sensitive data from the database.
- 5. which queries separate SQL code from user input, preventing injection attacks.
- 6. __________Injection attackers can determine the success of the query.