Across
- 2. Ensures that a user is who they say they are.
- 8. Validates that a user has permission to access the application by comparing the user’s identity with a list of authorized users.
- 9. Provides a time-stamped record of which aspects of the application were accessed and by whom.
Down
- 1. Safeguarding sensitive data while in transit or at rest.
- 3. Combines elements of both static and dynamic testing.
- 4. Check their code as they are writing it
- 5. Analyzes running code while simulating outside, or “black box” attacks.
- 6. Designed specifically for the mobile environments and can examine how an attacker can leverage the mobile OS and the apps running on them in its entirety.
- 7. Application ___________ the process of developing, testing, and adding security features within applications to prevent security vulnerabilities against threats such as unauthorized access and modification.
