Anticipating misuse

12345678910
Across
  1. 2. When asking users to upload a file, this type of file should never be allowed, as it could be malware
  2. 3. An acronym for cross-site scripting, where a hacker manages to insert malicious code onto a website in the hope that this code will run in website visitors' browsers
  3. 5. When you enter an email address without an '@' or a password containing only letters, you break the _______ _______ of the input (complete the missing words)
  4. 8. What is the problem with data such as 'abc' where a number is expected?
  5. 9. A 'presence check' checks for the presence of data in a field which must not be left _______ (complete this sentence)
  6. 10. What is the problem with the number 0 being entered when 1-10 was expected?
Down
  1. 1. One method of defending against brute-force attacks is to implement two-factor _______ (complete the missing word)
  2. 4. The act of inserting potentially harmful database code into an input field in the hope that it will be interpreted and executed on the server
  3. 6. What is the problem with the data when 1000 characters are entered into a field with a 20 character maximum?
  4. 7. When a DOS attack comes from a botnet of thousands of 'zombie' computers, this is known as a _______ DOS attack (fill in the gap)