Mod 5 1-b Application Security

123456789
Across
  1. 2. Ensures that a user is who they say they are.
  2. 8. Validates that a user has permission to access the application by comparing the user’s identity with a list of authorized users.
  3. 9. Provides a time-stamped record of which aspects of the application were accessed and by whom.
Down
  1. 1. Safeguarding sensitive data while in transit or at rest.
  2. 3. Combines elements of both static and dynamic testing.
  3. 4. Check their code as they are writing it
  4. 5. Analyzes running code while simulating outside, or “black box” attacks.
  5. 6. Designed specifically for the mobile environments and can examine how an attacker can leverage the mobile OS and the apps running on them in its entirety.
  6. 7. Application ___________ the process of developing, testing, and adding security features within applications to prevent security vulnerabilities against threats such as unauthorized access and modification.