Collections      Cybersecurity Collection      Security Solutions      OWASP Top 10                            
                        
                    
                    
                        OWASP Top 10 list items 7 and 6 involve applications that expose sensitive data and are not protected from modern attacks.                        
                    
                    
                                            
                            
                            
                                
                                    | Objectives | 
                                
                                    | OWASP A7 and A6 start the coursedescribe what insufficient attack protection isexploit insufficient attack protection and what kind of access is needed to exploit ituse nmap to scan a networkdetect insufficient attack protection and note how common it isuse online web app scannersdescribe the client/server HTTP exchangeanalyze Linux log rotation files for a Linux web serverlist the technical and business impacts of insufficient attack protectiondiscuss attacks that take advantage of insufficient attack protectiondescribe what sensitive data exposure isanalyze sensitive network traffic in Linuxdescribe how sensitive data exposure can be exploitedreview how sensitive data exposure can be exploited and what kind of access is needed to exploit itdescribe how easy it is to detect sensitive data exposure and how common it islist the technical and business impacts of sensitive data exposuredescribe how various attacks can result in sensitive data exposureprovide examples of sensitive data exposure attacks
Practice: Leaky and Unprepared Applications describe the impact of these exploits on the business and technical sides
 |