Главная
Study mode:
on
1
Intro
2
Dave Wichers
3
About the OWASP Top 10
4
OWASP Top Ten (2013 Edition)
5
What Didn't Change
6
OWASP Top 10 Risk Rating Methodology
7
What's Changed?
8
Mapping from 2010 to 2013 Top 10
9
OWASP Top Ten 2010-A6 Security Misconfiguration
10
Everyone Uses Vulnerable Libraries
11
2013-A9 - Using Known Vulnerable Components
12
What Can You Do to Avoid This?
13
Automation Example for Java-Maven Versions Plugin
14
OWASP Dependency Check
15
Expanded A7-Missing Function Level Access Control
16
_OWASP Top 10 2013 Development Methodology
Description:
Explore the 2013 OWASP Top 10 in this comprehensive 49-minute conference talk by Dave Wichers, COO of Aspect Security and OWASP Board member. Gain insights into the changes from the previous version and understand why they were made. Learn about each item in the 2013 OWASP Top 10, including the risks they pose to enterprises, how attackers can exploit them, and strategies for eliminating or mitigating these risks in your application portfolio. Discover the importance of the OWASP Top 10 as a de facto standard for web application security, referenced by numerous guidelines worldwide, including the Payment Card Industry (PCI) standard. Delve into topics such as security misconfiguration, using known vulnerable components, and missing function level access control. Benefit from Wichers' extensive experience in application security and his contributions to OWASP as he provides valuable insights for improving your organization's web application security posture.

The 2013 OWASP Top 10 - Understanding Web Application Security Risks

OWASP Foundation
Add to list
0:00 / 0:00