Across
- 5. -A backup strategy that ensures data can be restored if the database is compromised or corrupted. (7 letters)
- 6. - A type of attack that involves injecting malicious SQL code through user input fields to compromise the database
- 7. - The practice of ensuring that only authorized users can access and modify data in a database. (8 letters)
- 9. -A type of breach in which someone with legitimate access to a database misuses their privileges
Down
- 1. A security technique used to convert readable data into an unreadable format to protect sensitive information. (10 letters)
- 2. - A system or protocol that restricts access to a database based on IP address or other network attributes. (9 letters)
- 3. -The process of ensuring database software is kept up to date with the latest security fixes. (7 letters)
- 4. -A principle that restricts a user’s access to only the minimum amount of data necessary to perform their job. (7 letters)
- 8. -A detailed record of database activities, such as logins and queries, to detect suspicious behavior. (8 letters)
- 10. -A method of controlling access to a database by assigning permissions based on the roles of users. (3 letters)
