Mobile Security Cross Word

12345678910
Across
  1. 4. (12) | Replacing sensitive data with harmless tokens to protect information during storage or transmission.
  2. 6. (3) Complete: _____ (Application Programming Interface) | Interface allowing communication between software components, often targeted in attacks.
  3. 8. (11) Complete: Code _______ | Transforming software to make it difficult to analyze or reverse engineer.
  4. 9. (9) | Collecting data remotely from devices to monitor performance or security status.
  5. 10. (9) Complete: Application _____ | Process of securing an app by reducing its surface vulnerabilities.
Down
  1. 1. (7) | An isolated environment restricting app access to the broader system to contain threats.
  2. 2. (10) Complete: Device _______ | Cryptographic proof verifying that a device’s software and hardware integrity are intact.
  3. 3. (4) Complete: _____ing | Gaining privileged control on a device often bypassing built-in protections.
  4. 5. (8) | Software that mimics a physical mobile device to test app behavior in a safe environment.
  5. 7. (7) Complete: _____ Framework | Intercepting and modifying function calls or messages within an app to alter behavior.