aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--synopsis.pdfbin124778 -> 137987 bytes
-rw-r--r--synopsis.tex9
2 files changed, 7 insertions, 2 deletions
diff --git a/synopsis.pdf b/synopsis.pdf
index eaa6f6d..ee7b64c 100644
--- a/synopsis.pdf
+++ b/synopsis.pdf
Binary files differ
diff --git a/synopsis.tex b/synopsis.tex
index a803351..2769754 100644
--- a/synopsis.tex
+++ b/synopsis.tex
@@ -258,7 +258,11 @@ critical web application security risks:
A weakness in one component could lead to compromisitation of
the whole system. Application is just as secure its weakest
link.
- \item \textbf{A10:2017 - Insufficient Logging & Monitoring}
+ \item \textbf{A10:2017 - Insufficient Logging \& Monitoring}
+ Application needs to log what is happening inside it and its
+ status needs to be monitored so, in case of a breach,
+ the administrators could detect it, find a cause of it and fix
+ the weakness.
\end{itemize}
@@ -278,7 +282,8 @@ critical web application security risks:
The OWASP Foundation
\textit{OWASP Top 10 - 2017 (The Ten Most Critical Web
Application Security Risk)}
- \texttt{https://www.owasp.org/images/7/72/OWASP_Top_10-2017_%28en%29.pdf.pdf}
+ \texttt{https://www.owasp.org/images/7/72/
+ OWASP\_Top\_10-2017\_(en).pdf.pdf}
\bibitem{lyndaowasptop10}
Caroline Wong.