Across
- 3. dynamic application Security testing (4)
- 5. parses the code and identify constructs that seem to introduce threats.(4, 7)
- 6. Flying mammal
- 10. an action taken to harm an asset (6)
- 12. Has a trunk
- 14. a type of network security attack where the attacker takes control of a communication (9)
- 15. used by attackers to gain unauthorized access to systems or data (6, 8)
- 17. aprocess of converting data having many possible representations into a standard form (16)
- 20. technique used to attack data driven applications through code injection (3, 9)
- 21. cross-site Request Forgery (4)
- 22. an attempt to acquire sensitive information by redirecting to a false site (8)
- 24. Large marsupial
- 27. a weakness that makes a threat possible (13)
- 28. a character encoding standard (7)
- 29. an operating system (4)
- 31. provides remote access to a targeted computer system (6)
- 32. an open-standard application protocol for directory access (4)
Down
- 1. a method of bypassing normal authentication (8)
- 2. an open-source web application security project (5)
- 4. a possible danger that may act to breach security (6)
- 5. the art of writing or solving secret codes (12)
- 7. the act of confirming the truth of an attribute of an entity (14)
- 8. a list of known good inputs (9)
- 9. Likes to chase mice
- 11. a list of software weaknesses (3)
- 13. a safeguard that addresses a threat and mitigates risk (14)
- 16. authentication, authorization and accounting (3)
- 18. static application security testing (4)
- 19. the degree of resistance to, or protection from, harm (8)
- 22. provides pluggable dynamic authentication for applications and services (3)
- 23. process of creating computer software (6)
- 25. a software that controls the incoming and outgoing network traffic (8)
- 26. a malware program (5)
- 30. cross-site Scripting (3)
- 33. Man's best friend
