SQL INJECTION

12345678910
Across
  1. 3. SQL Injection Uses statistical inference to gain access to confidential data
  2. 7. acceptable characters and reject or encode special characters that could be used in injection attacks
  3. 8. Which type of SQL Injection allows attackers to extract sensitive information or modify the database itself.
  4. 9. web page vulnerability that lets an attacker make queries with the database.
  5. 10. Which of the following field is susceptible to SQL injection?
Down
  1. 1. Which type of SQL Injection Attackers exploit error messages generated by the web application
  2. 2. Attack which stole personal records belonging to students, faculty, and staff.
  3. 4. Out-of-band SQL Injection Allows attackers to ___________ sensitive data from the database.
  4. 5. which queries separate SQL code from user input, preventing injection attacks.
  5. 6. __________Injection attackers can determine the success of the query.