Module 5 Unit 1b Application Security

12345678
Across
  1. 4. Ensures that only authorized users gain access to it
  2. 6. Sensitive data must be _________
  3. 7. Used to validate user permissions
  4. 8. This form of testing analyzes code during the development process
Down
  1. 1. Analysis of running code would be called _______ testing
  2. 2. Designed for Mobile OS environments
  3. 3. An external expert hired to attempt to gain access to a system
  4. 5. Record of access