This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Competitors"
From OWASP
Infosegura (talk | contribs) (New page: == Description == Competition is an interaction between individuals from the same species or different species (Human, animal or vegetal) who dispute something. This dispute may be for foo...) |
Infosegura (talk | contribs) |
||
Line 1: | Line 1: | ||
== Description == | == Description == | ||
− | Competition is an interaction between individuals from the same species or different species (Human, animal or vegetal) who dispute something. This dispute may be for food, for territory, for light, for employment, for female, for male and so on. | + | Competition is an interaction between individuals from the same species or different species (Human, animal or vegetal) who dispute something. This dispute may be for food, for territory, for light, for employment, for female, for male and so on. So the competition is an incentive for self-improvement, it is necessary to overcome the expectations to win it. |
− | The competition can be destructive, | + | The competition can be destructive, when the individual/group/organism seeks to benefit by damaging/eliminating competing or cooperative |
== Risk Factors == | == Risk Factors == | ||
TBD | TBD | ||
− | == Examples ==TBD | + | == Examples == |
+ | TBD | ||
==Related [[Attacks]]== | ==Related [[Attacks]]== |
Revision as of 17:57, 23 June 2008
Description
Competition is an interaction between individuals from the same species or different species (Human, animal or vegetal) who dispute something. This dispute may be for food, for territory, for light, for employment, for female, for male and so on. So the competition is an incentive for self-improvement, it is necessary to overcome the expectations to win it. The competition can be destructive, when the individual/group/organism seeks to benefit by damaging/eliminating competing or cooperative
Risk Factors
TBD
Examples
TBD
Related Attacks
TBD
Related Vulnerabilities
TBD
References
TBD