Across
- 2. This tool is used to dispose off documents that contain personal or financial information
- 4. Where would an attacker look to erase his footprints
- 7. is a technique to make data unreadable to anyone
- 9. Injection What is the attack technique used to exploit web sites by altering backend database queries through inputting manipulated queries?
- 10. Always _ your computer when you leave your desk
Down
- 1. is used for authenticating a user
- 3. What provides encryption of data in transit
- 5. hijacking An attack for stealing user’s session
- 6. Where is the session ID commonly stored
- 8. often redirects users to enter sensitive information like usernames, passwords, and credit card details at a fake website whose look and feel is almost identical to the legitimate one
