From the course: Cloud Security Considerations for Government and the Military

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Critical vulnerabilities

Critical vulnerabilities

From the course: Cloud Security Considerations for Government and the Military

Start my 1-month free trial

Critical vulnerabilities

- [Instructor] The OWASP Top 10 represents a broad industry consensus on the most critical security risk to web applications. These security risks, in order of their consensus risk evaluation, are injection flaws, such as sequel, no sequel, operating system, and LDAP Injection that occur when untrusted data is sent to an interpreter as part of a command or query. Broken Authentication, which refer to incorrectly implemented authentication and session management processes. Sensitive Data Exposure, which describes web applications and APIs that do not properly protect sensitive data, such as financial, healthcare, and personally identifiable information. XML External Entities, where older, more poorly configured XML processors evaluate external entity references within XML documents in a way that discloses internal files. Broken Access Control, that occurs when restrictions on what authenticated users are allowed…

Contents