Across
- 5. Flaw that occurs when untrusted data is sent to an interpreter as part of a command or query and the attacker's hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization.
- 7. Company behind Burp and the Web Security Academy which contains high-quality learning materials, interactive vulnerability labs, and video tutorials.
- 10. Flaw that occurs when application functions related to authentication and session management are implemented incorrectly, allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users' identities temporarily or permanently.
- 11. Attack using poorly configured XML processors evaluate external entity references within XML documents, which can be used to disclose internal files using the file URI handler, internal file shares, internal port scanning, remote code execution, and denial of service attacks.
- 12. Set of technologies designed to detect conditions indicative of a security vulnerability in an application in its running state.
- 14. This Kubernetes Benchmark is a reference document that can be used by system administrators, security and audit professionals and other IT roles to establish a secure configuration baseline for Kubernetes.
- 16. Ericssons model to incorporate security and privacy considerations into all phases of product development.
- 17. One of the world’s most popular free security tools for finding security vulnerabilities in web applications.
Down
- 1. Flaw exploited to access unauthorized functionality and/or data, such as access other users' accounts, view sensitive files, modify other users' data, change access rights, etc.
- 2. Cyclical practice of identifying, classifying, prioritizing, remediating, and mitigating software vulnerabilities.
- 3. Set of technologies designed to analyze application source code, byte code and binaries for coding and design conditions that are indicative of security vulnerabilities.
- 4. Recognized as a fundamental human right by the United Nations (UN) in Article 12 of the Universal Declaration of Human Rights
- 6. Responsible for Ericsson product vulnerability management process, coordination of customer product security incidents and reported security issues affecting Ericsson products, solutions, and services.
- 8. Practice of increasing product security by reducing its attack surface.
- 9. Comprehensive, versatile, automated black box fuzzer that enables organizations to efficiently and effectively discover and remediate security weaknesses in software.
- 13. A massive playground for you to learn and improve your pen-testing skills.
- 15. Software testing technique consisting of finding implementation bugs using malformed/semi-malformed data injection in an automated fashion.
