This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Bounds Checking"
From OWASP
(5 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
+ | {{Template:Stub}} | ||
+ | |||
{{Template:Control}} | {{Template:Control}} | ||
+ | {{taggedDocument | ||
+ | | type=inactiveDraft | ||
+ | | lastRevision=2016-07-27 | ||
+ | | comment=Content is incomplete | ||
+ | }} | ||
<br> | <br> | ||
[[Category:OWASP ASDR Project]] | [[Category:OWASP ASDR Project]] | ||
− | |||
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' | Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' | ||
Line 47: | Line 53: | ||
* [[Vulnerability 1]] | * [[Vulnerability 1]] | ||
* [[Vulnerabiltiy 2]] | * [[Vulnerabiltiy 2]] | ||
− | |||
− | |||
Line 56: | Line 60: | ||
* [[Control 2]] | * [[Control 2]] | ||
− | |||
==References== | ==References== | ||
− | + | TBD | |
− | + | ||
+ | [[Category:FIXME/delete| | ||
Line 86: | Line 90: | ||
Logging and Auditing Control | Logging and Auditing Control | ||
− | Session Management Control | + | Session Management Control]] |
__NOTOC__ | __NOTOC__ | ||
[[Category:Control]] | [[Category:Control]] |
Latest revision as of 17:44, 28 July 2016
This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.
This is a control. To view all control, please see the Control Category page.
This page contains draft content that has never been finished. Please help OWASP update this content! See FixME.
Last revision (yyyy-mm-dd): 2016-07-27
Comment: Content is incomplete
Last revision (yyyy-mm-dd): 2016-07-27
Comment: Content is incomplete
Last revision (mm/dd/yy): 07/28/2016
Description
A control (countermeasure or security control) is a protection mechanism that prevents, deters, or detects attacks, or prevents or reduces vulnerabilities.
- Start with a one-sentence description of the control
- How does the countermeasure work?
- What are some examples of implementations of the control (steer clear of specific products)
Risk Factors
- Talk about the factors that this control affects
- What effect does this countermeasure have on the attack or vulnerability?
- Does this control reduce the technical or business impact?
Difficulty to Implement
- Discuss the typical difficulty of implementing this control, emphasizing the factors that make it easier or harder
- Steer clear of language/platform specific information here
Examples
Short example name
- A short example description, small picture, or sample code with links
Short example name
- A short example description, small picture, or sample code with links
Related Attacks
Related Vulnerabilities
Related Controls
References
TBD