This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Getting Started"
From OWASP
Line 1: | Line 1: | ||
'''Getting Started in Application Security''' | '''Getting Started in Application Security''' | ||
+ | |||
+ | ==Application Security Overview== | ||
+ | |||
+ | Drivers, market, business reasons | ||
==About Vulnerabilities== | ==About Vulnerabilities== | ||
+ | Design flaws and Implementation Bugs | ||
+ | Common areas (Top 10) | ||
== Root Causes of Vulnerabilities == | == Root Causes of Vulnerabilities == | ||
− | + | Project Level | |
− | + | Security Requirements | |
− | + | Threat Modeling | |
− | + | Architecture Review | |
− | Security Requirements | + | Code Review |
− | Threat Modeling | + | Penetration Testing |
− | Architecture Review | + | Vulnerability Scanning |
− | Code Review | + | Project Responsibility and Roles |
− | Penetration Testing | + | Budget |
− | Vulnerability Scanning | ||
− | |||
− | |||
− | |||
− | + | Organization Level | |
+ | Metrics | ||
+ | Policies | ||
+ | Templates | ||
+ | Standard Tools | ||
+ | Community of Interest | ||
+ | Executive Responsibility and Roles | ||
+ | Budget |
Revision as of 20:42, 27 March 2006
Getting Started in Application Security
Application Security Overview
Drivers, market, business reasons
About Vulnerabilities
Design flaws and Implementation Bugs Common areas (Top 10)
Root Causes of Vulnerabilities
Project Level
Security Requirements Threat Modeling Architecture Review Code Review Penetration Testing Vulnerability Scanning Project Responsibility and Roles Budget
Organization Level
Metrics Policies Templates Standard Tools Community of Interest Executive Responsibility and Roles Budget