Across
- 5. A type of security testing that simulates an attacker with knowledge of the system ( ____ testing)
- 6. A security principle that means users should have access only to the resources they need (least ____)
- 8. A type of vulnerability that allows attackers to execute code remotely (remote code ____)
Down
- 1. A type of security control that can help prevent cross-site scripting attacks (input ____)
- 2. A type of security control that can help prevent buffer overflow attacks (stack ____)
- 3. A type of security control that can help prevent cross-site request forgery attacks (____ token)
- 4. A type of vulnerability that can allow attackers to access sensitive information (____ injection)
- 5. A common technique used to prevent SQL injection attacks (____ parameters)
- 7. A type of security testing that tries to break an application by feeding unexpected input (_____testing)
