Across
- 5. Safeguarding digital keys used in access systems
- 6. One-way data transformation technique
- 10. Verifying user access to software endpoints
- 11. Abbreviation for browser-based script attack
Down
- 1. Attack that manipulates database queries
- 2. Replacing sensitive data with surrogate values
- 3. Scrubbing data of personal identifiers
- 4. Extra layer of login protection (abbr.)
- 7. Acronym for a policy inviting ethical hacking (abbr.)
- 8. Nonprofit focused on web security best practices
- 9. Simulated cyberattack to test defenses (abbr.)
