Across
- 2. When asking users to upload a file, this type of file should never be allowed, as it could be malware
- 3. An acronym for cross-site scripting, where a hacker manages to insert malicious code onto a website in the hope that this code will run in website visitors' browsers
- 5. When you enter an email address without an '@' or a password containing only letters, you break the _______ _______ of the input (complete the missing words)
- 8. What is the problem with data such as 'abc' where a number is expected?
- 9. A 'presence check' checks for the presence of data in a field which must not be left _______ (complete this sentence)
- 10. What is the problem with the number 0 being entered when 1-10 was expected?
Down
- 1. One method of defending against brute-force attacks is to implement two-factor _______ (complete the missing word)
- 4. The act of inserting potentially harmful database code into an input field in the hope that it will be interpreted and executed on the server
- 6. What is the problem with the data when 1000 characters are entered into a field with a 20 character maximum?
- 7. When a DOS attack comes from a botnet of thousands of 'zombie' computers, this is known as a _______ DOS attack (fill in the gap)
