From the course: Cloud Security Considerations for the Healthcare Industry
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Critical vulnerabilities
From the course: Cloud Security Considerations for the Healthcare Industry
Critical vulnerabilities
- [Instructor] The OWASP Top 10 represents a broad industry consensus on the most critical security risk to web applications. These security risk, in order of their consensus risk evaluation, are injection flaws such as SQL, no SQL, operating system, and LDAP injection that occur when untrusted data is sent to an interpreter as part of a command or query. Broken authentication which refer to an incorrectly implemented authentication and session management processes. Sensitive data exposure which describes web applications and APIs that do not properly protect sensitive data such as financial, healthcare and personally identifiable information. XML external entities where older, or poorly configured XML processors evaluate external entity references within XML documents in a way that discloses internal files. Broken access control that occurs when restrictions on what authenticated users are allowed to do are not properly enforced, and attackers exploit these flaws to access…
Contents
-
-
-
Key cloud-computing drivers2m 32s
-
(Locked)
Cloud-computing characteristics3m 20s
-
(Locked)
Deployment models2m 53s
-
(Locked)
Service models6m 58s
-
(Locked)
IT implementation options1m 47s
-
(Locked)
Infrastructure attack vectors1m 25s
-
(Locked)
Software attack vectors2m 24s
-
(Locked)
Critical vulnerabilities3m 21s
-
-
-
-
-
-