ANALYTICS

12345678910111213141516171819202122232425
Across
  1. 3. parses the code and identify constructs that seem to introduce threats.(4, 7)
  2. 8. technique used to attack data driven applications through code injection (3, 9)
  3. 10. a weakness that makes a threat possible (13)
  4. 12. a software that controls the incoming and outgoing network traffic (8)
  5. 14. the degree of resistance to, or protection from, harm (8)
  6. 16. an open-source web application security project (5)
  7. 18. the act of confirming the truth of an attribute of an entity (14)
  8. 21. process of creating computer software (6)
  9. 22. an operating system (4)
  10. 24. provides remote access to a targeted computer system (6)
  11. 25. a type of network security attack where the attacker takes control of a communication (9)
Down
  1. 1. a method of bypassing normal authentication (8)
  2. 2. an attempt to acquire sensitive information by redirecting to a false site (8)
  3. 3. a safeguard that addresses a threat and mitigates risk (14)
  4. 4. a list of known good inputs (9)
  5. 5. an action taken to harm an asset (6)
  6. 6. dynamic application Security testing (4)
  7. 7. a list of software weaknesses (3)
  8. 9. used by attackers to gain unauthorized access to systems or data (6, 8)
  9. 11. authentication, authorization and accounting (3)
  10. 13. cross-site Request Forgery (4)
  11. 15. a character encoding standard (7)
  12. 17. a malware program (5)
  13. 19. a possible danger that may act to breach security (6)
  14. 20. the art of writing or solving secret codes (12)
  15. 23. cross-site Scripting (3)