Главная
Study mode:
on
1
Intro
2
Core Principles
3
Start with the Data
4
It can be a little messy
5
Managing Likelihood
6
Need More Data
7
CVSS Scoring
8
Data Porridge
9
(Not so) Secret Formula
Description:
Explore the creation process and underlying principles of the OWASP Top 10 in this informative 26-minute video presentation. Delve into the core principles, data collection methods, and challenges faced in compiling this crucial cybersecurity resource. Learn about managing likelihood, the importance of comprehensive data, and the intricacies of CVSS scoring. Gain insights into the (not so) secret formula used to determine the most critical web application security risks. Understand how the OWASP Foundation navigates through the complexities of data analysis to produce this invaluable guide for developers, security professionals, and organizations worldwide.

OWASP Top 10 - The Making of the OWASP Top 10 and Beyond

OWASP Foundation
Add to list
0:00 / 0:00