This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Template:Top 10:SummaryTableTemplate"

From OWASP
Jump to: navigation, search
m
Line 36: Line 36:
  
 
{{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2013}}
 
{{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2013}}
{{Top_10:SummaryTableTemplate|type=valueOnly|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013|language=de}}
+
{{Top_10:SummaryTableTemplate|type=valueOnly|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013|language=de}}</td></tr>
 +
<tr>{{Top_10:SummaryTableTemplate|type=valueOnly|exploitability=1|prevalence=1|detectability=1|impact=1|year=2013|language=de}}</td></tr>
 +
<tr>{{Top_10:SummaryTableTemplate|type=valueOnly|exploitability=2|prevalence=2|detectability=2|impact=2|year=2013|language=de}}</td></tr>
 +
<tr>{{Top_10:SummaryTableTemplate|type=valueOnly|exploitability=3|prevalence=3|detectability=3|impact=3|year=2013|language=de}}
 
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}
 
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}
 
{{Top_10_2010:SummaryTableEndTemplate|year=2013}}
 
{{Top_10_2010:SummaryTableEndTemplate|year=2013}}

Revision as of 16:06, 17 April 2013

Usage

 
 {{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013}}
 {{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013}}
 {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}
 {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
 
Threat Agents Attack Vectors Security Weakness Technical Impacts Business Impacts
Application Specific Exploitability
AVERAGE
Prevalence
VERY WIDESPREAD
Detectability
EASY
Impact
MODERATE
Application / Business Specific




 
 {{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2013}}
 {{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013|language=de}}
 {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}
 {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
 
Bedrohungsquellen Angriffsvektoren Schwachstellen Technische Auswirkung Auswirkung auf das Unternehmen
Anwendungs-
spezifisch
Ausnutzbarkeit
DURCHSCHNITTLICH
Verbreitung
AUSSERGEWÖHNLICH HÄUFIG
Auffindbarkeit
EINFACH
Auswirkung
MITTEL
Application / Business Specific




 
 {{Top_10_2010:SummaryTableHeaderBeginTemplate|language=de|year=2013}}
 {{Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2013|language=de}}
 {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}
 {{Top_10_2010:SummaryTableEndTemplate|year=2013}}
 
</td>

<tr> <td style="{{{style}}}; background-color: #FF0000; color: #000000; border: 3px solid #444444" width="16.5%"> EINFACH</td>

    <td style="{{{style}}}; background-color: #FF0000; color: #000000; border: 3px solid #444444" width="16.5%"> SEHR HÄUFIG</td>
   <td style="{{{style}}}; background-color: #FF0000; color: #000000; border: 3px solid #444444" width="16.5%"> EINFACH</td>
    <td style="{{{style}}}; background-color: #FF0000; color: #000000; border: 3px solid #444444" width="16.5%"> SCHWERWIEGEND</td></td></tr>

<tr> <td style="{{{style}}}; background-color: #FFB200; color: #000000; border: 3px solid #444444" width="16.5%"> DURCHSCHNITTLICH</td>

    <td style="{{{style}}}; background-color: #FFB200; color: #000000; border: 3px solid #444444" width="16.5%"> HÄUFIG</td>
   <td style="{{{style}}}; background-color: #FFB200; color: #000000; border: 3px solid #444444" width="16.5%"> DURCHSCHNITTLICH</td>
    <td style="{{{style}}}; background-color: #FFB200; color: #000000; border: 3px solid #444444" width="16.5%"> MITTEL</td></td></tr>

<tr> <td style="{{{style}}}; background-color: #FFFF00; color: #000000; border: 3px solid #444444" width="16.5%"> SCHWIERIG</td>

    <td style="{{{style}}}; background-color: #FFFF00; color: #000000; border: 3px solid #444444" width="16.5%"> SELTEN</td>
   <td style="{{{style}}}; background-color: #FFFF00; color: #000000; border: 3px solid #444444" width="16.5%"> SCHWIERIG</td>
    <td style="{{{style}}}; background-color: #FFFF00; color: #000000; border: 3px solid #444444" width="16.5%"> GERING</td>
    <td style="font-size: 100%; font-weight: bold; background-color: #D9D9D9; color: #000000; border: 3px solid #444444">

Application / Business Specific </td> </tr> <tr valign="top"> </tr></table></center>



Bedrohungsquellen Angriffsvektoren Schwachstellen Technische Auswirkung Auswirkung auf das Unternehmen
Anwendungs-
spezifisch
DURCHSCHNITTLICH AUSSERGEWÖHNLICH HÄUFIG EINFACH MITTEL