Across
- 4. An iterative and flexible approach to software development and delivery.
- 7. A condition where a program fails to release unused memory, reducing performance.
- 8. A Windows feature that limits application privileges to prevent unauthorized changes.
- 9. A condition where a calculation exceeds the max value of an integer type.
- 10. A security feature that randomly arranges memory addresses to prevent exploits.
- 11. Analyzing source code to find and fix security vulnerabilities.
- 12. A vulnerability that allows attackers to run arbitrary code on a remote system.
- 14. An attack technique that accesses restricted files by manipulating file paths.
- 17. The process of planning, creating, testing, and deploying secure software.
- 18. Best practices for writing software that avoids introducing security flaws.
- 19. Testing software with full access to internal logic and source code.
Down
- 1. An error that occurs when a program tries to access memory through a null pointer.
- 2. A linear and sequential software development methodology.
- 3. Identifying and evaluating potential security risks in an application.
- 5. Testing software without knowing its internal code or logic.
- 6. Checking and filtering user input to prevent malicious data processing.
- 11. A method of handling software errors without crashing the system.
- 13. An isolated environment used to run and test code safely.
- 15. A type of Flash-based browser cookie stored locally on the user's device.
- 16. A technique that tests software by inputting large amounts of random data.
