This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Quotas"
From OWASP
(New page: {{Template:Stub}} Every '''Control''' should follow this template. {{Template:Control}} <br> Category:OWASP ASDR Project ASDR Table of Contents__TOC__ Last revision (mm/dd/y...) |
|||
Line 51: | Line 51: | ||
* [[Vulnerability 1]] | * [[Vulnerability 1]] | ||
* [[Vulnerabiltiy 2]] | * [[Vulnerabiltiy 2]] | ||
− | |||
− | |||
Line 60: | Line 58: | ||
* [[Control 2]] | * [[Control 2]] | ||
− | + | ==References== | |
− | + | TBD | |
− | + | [[Category:FIXME| | |
− | |||
Line 90: | Line 87: | ||
Logging and Auditing Control | Logging and Auditing Control | ||
− | Session Management Control | + | Session Management Control]] |
__NOTOC__ | __NOTOC__ | ||
[[Category:Control]] | [[Category:Control]] |
Revision as of 18:51, 27 October 2008
This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.
Every Control should follow this template.
This is a control. To view all control, please see the Control Category page.
ASDR Table of Contents
Last revision (mm/dd/yy): 10/27/2008
Description
A control (countermeasure or security control) is a protection mechanism that prevents, deters, or detects attacks, or prevents or reduces vulnerabilities.
- Start with a one-sentence description of the control
- How does the countermeasure work?
- What are some examples of implementations of the control (steer clear of specific products)
Risk Factors
- Talk about the factors that this control affects
- What effect does this countermeasure have on the attack or vulnerability?
- Does this control reduce the technical or business impact?
Difficulty to Implement
- Discuss the typical difficulty of implementing this control, emphasizing the factors that make it easier or harder
- Steer clear of language/platform specific information here
Examples
Short example name
- A short example description, small picture, or sample code with links
Short example name
- A short example description, small picture, or sample code with links
Related Attacks
Related Vulnerabilities
Related Controls
References
TBD