Test 1

12345678910
Across
  1. 2. This tool is used to dispose off documents that contain personal or financial information
  2. 4. Where would an attacker look to erase his footprints
  3. 7. is a technique to make data unreadable to anyone
  4. 9. Injection What is the attack technique used to exploit web sites by altering backend database queries through inputting manipulated queries?
  5. 10. Always _ your computer when you leave your desk
Down
  1. 1. is used for authenticating a user
  2. 3. What provides encryption of data in transit
  3. 5. hijacking An attack for stealing user’s session
  4. 6. Where is the session ID commonly stored
  5. 8. often redirects users to enter sensitive information like usernames, passwords, and credit card details at a fake website whose look and feel is almost identical to the legitimate one