From 5ee049db8c978cb9f7fac4a47c5638d9ef2893c7 Mon Sep 17 00:00:00 2001 From: Marcin Zelent Date: Thu, 17 May 2018 14:02:21 +0200 Subject: Started writing about OWASP Top 10 --- synopsis.tex | 9 +++++++++ 1 file changed, 9 insertions(+) (limited to 'synopsis.tex') diff --git a/synopsis.tex b/synopsis.tex index 8d49de1..d6b781d 100644 --- a/synopsis.tex +++ b/synopsis.tex @@ -201,6 +201,15 @@ usually it is also connected to the network. Finally, the attacker could use the functionality of the compromised IoT devices in a bad way, for example making them use a lot of power, causing short circuit or even starting fire. +\subsection{Most common application security vulnerabilities} + +There are many possible weaknesses but some of them occur more often than the +rest. A non-profit organization called Open Web Application Security Project +(or just OWASP for short), which mission is to make software more secure, +publishes a compilation of these vulnerabilities every 3 years in a document +titled \textit{OWASP Top 10 - The Ten Most Critical Web Application Security +Risks}. + \section{Conclusion} \section{Reflection} -- cgit v1.2.3