Across
- 1. Session___ is an attack for stealing user’s session (9)
- 3. Path___ vulnerability allows you to access files and directories directly (9)
- 7. __is used for authenticating a user (8)
- 9. Where is the session ID commonly stored? (6)
- 10. ___ is one of the techniques that can be used for data masking in HSBC (5)
Down
- 2. SQL___ is an attack technique used to exploit backend database using manipulated queries? (9)
- 4. This protocol is widely used to encrypt data in transit (3)
- 5. Where would an attacker look to erase his footprints? (4)
- 6. __is used in websites to prevent malicious users from using bots (7)
- 8. This is the single most critical piece in an encryption infrastructure (3)
