This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Top 10-2017 Top 10"
From OWASP
m (added year of release to Top 10-A1..A10) |
m (Other languages added) |
||
(One intermediate revision by one other user not shown) | |||
Line 1: | Line 1: | ||
+ | === [[OWASP_Top_Ten_Project#Translation_Efforts_2|Translation Efforts - Otros Idiomas]] === | ||
{{Top_10_2013:TopTemplate | {{Top_10_2013:TopTemplate | ||
|useprev=2017PrevLink | |useprev=2017PrevLink | ||
Line 57: | Line 58: | ||
{{Top 10:GrayBoxEnd|year=2017}} | {{Top 10:GrayBoxEnd|year=2017}} | ||
{{Top_10:GradientBox|year=2017}} | {{Top_10:GradientBox|year=2017}} | ||
− | <b><u>[[{{Top_10:LanguageFile|text=documentRootTop10New|language=en|year=2017 }} | + | <b><u>[[{{Top_10:LanguageFile|text=documentRootTop10New|language=en|year=2017 }} A10-{{Top_10_2010:ByTheNumbers|10|year=2017|language=en}} | A10:2017-{{Top_10_2010:ByTheNumbers|10|year=2017|language=en}}]]</u></b> |
: Insufficient logging and monitoring, coupled with missing or ineffective integration with incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems, and tamper, extract, or destroy data. Most breach studies show time to detect a breach is over 200 days, typically detected by external parties rather than internal processes or monitoring. | : Insufficient logging and monitoring, coupled with missing or ineffective integration with incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems, and tamper, extract, or destroy data. Most breach studies show time to detect a breach is over 200 days, typically detected by external parties rather than internal processes or monitoring. | ||
{{Top 10:GrayBoxEnd|year=2017}} | {{Top 10:GrayBoxEnd|year=2017}} |
Latest revision as of 20:45, 27 March 2018
Translation Efforts - Otros Idiomas
OWASP Top 10 Application Security Risks - 2017
A3:2017-Sensitive Data Exposure
A4:2017-XML External Entities (XXE)
A6:2017-Security Misconfiguration
A7:2017-Cross-Site Scripting (XSS)
A8:2017-Insecure Deserialization
A9:2017-Using Components with Known Vulnerabilities
A10:2017-Insufficient Logging&Monitoring
|