diff options
author | Marcin Zelent <zelent.marcin@gmail.com> | 2018-05-17 14:02:21 +0200 |
---|---|---|
committer | Marcin Zelent <zelent.marcin@gmail.com> | 2018-05-17 14:02:21 +0200 |
commit | 5ee049db8c978cb9f7fac4a47c5638d9ef2893c7 (patch) | |
tree | 2bdffb375248321f7cc05bb337e6054c47adb310 /synopsis.tex | |
parent | a1383ba6446240a20ff4856c743713c1cb5fccd4 (diff) |
Started writing about OWASP Top 10
Diffstat (limited to 'synopsis.tex')
-rw-r--r-- | synopsis.tex | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/synopsis.tex b/synopsis.tex index 8d49de1..d6b781d 100644 --- a/synopsis.tex +++ b/synopsis.tex @@ -201,6 +201,15 @@ usually it is also connected to the network. Finally, the attacker could use the functionality of the compromised IoT devices in a bad way, for example making them use a lot of power, causing short circuit or even starting fire. +\subsection{Most common application security vulnerabilities} + +There are many possible weaknesses but some of them occur more often than the +rest. A non-profit organization called Open Web Application Security Project +(or just OWASP for short), which mission is to make software more secure, +publishes a compilation of these vulnerabilities every 3 years in a document +titled \textit{OWASP Top 10 - The Ten Most Critical Web Application Security +Risks}. + \section{Conclusion} \section{Reflection} |