0 votes
in Data Handling by
The process of auditing the source code for an application to verify that the proper security controls are present, that they work as intended, and that they have been invoked in all the right places is known as ______________.

Black Box Testing

Penetration Testing

Secure Code Review

Vulnerability Testing
...