This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Resource Locking"
From OWASP
(One intermediate revision by one other user not shown) | |||
Line 1: | Line 1: | ||
{{Template:Stub}} | {{Template:Stub}} | ||
− | + | {{taggedDocument | |
+ | | type=inactiveDraft | ||
+ | | lastRevision=2016-07-27 | ||
+ | | comment=Incomplete page, missing examples and content | ||
+ | }} | ||
Every '''[[Control]]''' should follow this template. | Every '''[[Control]]''' should follow this template. | ||
Line 6: | Line 10: | ||
<br> | <br> | ||
[[Category:OWASP ASDR Project]] | [[Category:OWASP ASDR Project]] | ||
− | |||
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' | Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' |
Latest revision as of 01:46, 28 July 2016
This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.
This page contains draft content that has never been finished. Please help OWASP update this content! See FixME.
Last revision (yyyy-mm-dd): 2016-07-27
Comment: Incomplete page, missing examples and content
Last revision (yyyy-mm-dd): 2016-07-27
Comment: Incomplete page, missing examples and content
Every Control should follow this template.
This is a control. To view all control, please see the Control Category page.
Last revision (mm/dd/yy): 07/28/2016
Description
A control (countermeasure or security control) is a protection mechanism that prevents, deters, or detects attacks, or prevents or reduces vulnerabilities.
- Start with a one-sentence description of the control
- How does the countermeasure work?
- What are some examples of implementations of the control (steer clear of specific products)
Risk Factors
- Talk about the factors that this control affects
- What effect does this countermeasure have on the attack or vulnerability?
- Does this control reduce the technical or business impact?
Difficulty to Implement
- Discuss the typical difficulty of implementing this control, emphasizing the factors that make it easier or harder
- Steer clear of language/platform specific information here
Examples
Short example name
- A short example description, small picture, or sample code with links
Short example name
- A short example description, small picture, or sample code with links
Related Attacks
Related Vulnerabilities
Related Controls
References
TBD