Safe to Speed

12345678910
Across
  1. 7. Without proper input _____, malicious actors can send a malicious input into your web application form to inject malicious code to extract sensitive data from your database.
  2. 9. Performing threat _____ at the start of your project will give you insight into your system's risk profile.
  3. 10. Systems infected by malicious actor can be used to partake in a _____. This allows the malicious actor to use your infected system to conduct attacks to achieve their goals.
Down
  1. 1. _____ programs attempt to utilise your system's compute resource (Without your knowledge) to mine for cryptocurrencies.
  2. 2. Regular review of _____ accounts ensures that no unauthorised users are misusing the accounts outside the bounds of the system owner's knowledge.
  3. 3. Doing system _____ will ensure that your systems are protected from the most basic and common attacks.
  4. 4. It's important to understand potential vendor's cybersecurity _____ to evaluate if they have both innovation and cybersecurity best practices in mind.
  5. 5. Security _____ helps identify business logic flaws and bugs in your application code.
  6. 6. This provides you with a simpler and balanced means of ensuring cybersecurity best practices during a proof of concept/value or minimum viable product stage.
  7. 8. _____ are often leaked on public code repositories due to developers using loosely configured code repositories.