aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMarcin Zelent <zelent.marcin@gmail.com>2018-05-17 14:02:21 +0200
committerMarcin Zelent <zelent.marcin@gmail.com>2018-05-17 14:02:21 +0200
commit5ee049db8c978cb9f7fac4a47c5638d9ef2893c7 (patch)
tree2bdffb375248321f7cc05bb337e6054c47adb310
parenta1383ba6446240a20ff4856c743713c1cb5fccd4 (diff)
Started writing about OWASP Top 10
-rw-r--r--synopsis.tex9
1 files changed, 9 insertions, 0 deletions
diff --git a/synopsis.tex b/synopsis.tex
index 8d49de1..d6b781d 100644
--- a/synopsis.tex
+++ b/synopsis.tex
@@ -201,6 +201,15 @@ usually it is also connected to the network. Finally, the attacker could use the
functionality of the compromised IoT devices in a bad way, for example making
them use a lot of power, causing short circuit or even starting fire.
+\subsection{Most common application security vulnerabilities}
+
+There are many possible weaknesses but some of them occur more often than the
+rest. A non-profit organization called Open Web Application Security Project
+(or just OWASP for short), which mission is to make software more secure,
+publishes a compilation of these vulnerabilities every 3 years in a document
+titled \textit{OWASP Top 10 - The Ten Most Critical Web Application Security
+Risks}.
+
\section{Conclusion}
\section{Reflection}