This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Top 10 2013-Details About Risk Factors"

From OWASP
Jump to: navigation, search
Line 9: Line 9:
  
 
The following table presents a summary of the 2013 Top 10 Application Security Risks, and the risk factors we have assigned to each risk. These factors were determined based on the available statistics and the experience of the OWASP Top 10 team. To understand these risks for a particular application or organization, <u>you must consider your own specific threat agents and business impacts</u>. Even egregious software weaknesses may not present a serious risk if there are no threat agents in a position to perform the necessary attack or the business impact is negligible for the assets involved.
 
The following table presents a summary of the 2013 Top 10 Application Security Risks, and the risk factors we have assigned to each risk. These factors were determined based on the available statistics and the experience of the OWASP Top 10 team. To understand these risks for a particular application or organization, <u>you must consider your own specific threat agents and business impacts</u>. Even egregious software weaknesses may not present a serious risk if there are no threat agents in a position to perform the necessary attack or the business impact is negligible for the assets involved.
 
TABLE GOES HERE
 
  
 
<center>
 
<center>
<table style="align:center; text-align:center; margin: 0px 5px 0px 5px; border: 3px solid {{Top 10:BorderColor|year=2013 }};  
+
<table style="align:center; text-align:center; margin: 0px 5px 0px 5px; border: 3px solid #000000;  
  
 
   background-color: {{Top 10:BackgroundColor|year=2013 }};
 
   background-color: {{Top 10:BackgroundColor|year=2013 }};
Line 86: Line 84:
 
{{Top_10_2010:SummaryTableValue-2-Template||AVERAGE|year=2013}}
 
{{Top_10_2010:SummaryTableValue-2-Template||AVERAGE|year=2013}}
 
{{Top_10_2010:SummaryTableValue-1-Template||WIDESPREAD|year=2013}}
 
{{Top_10_2010:SummaryTableValue-1-Template||WIDESPREAD|year=2013}}
{{Top_10_2010:SummaryTableValue-3-Template||Difficult|year=2013}}
+
{{Top_10_2010:SummaryTableValue-3-Template||DIFFICULT|year=2013}}
 
{{Top_10_2010:SummaryTableValue-2-Template||MODERATE|year=2013}}
 
{{Top_10_2010:SummaryTableValue-2-Template||MODERATE|year=2013}}
 
<td>&nbsp;</td></tr>
 
<td>&nbsp;</td></tr>
Line 100: Line 98:
 
</table></center> <!-- End risk table -->
 
</table></center> <!-- End risk table -->
  
TABLE GOES HERE
 
 
</td></tr></table> <!-- Close big box -->
 
</td></tr></table> <!-- Close big box -->
  

Revision as of 04:56, 9 March 2013

NOTE: THIS IS NOT THE LATEST VERSION. Please visit the OWASP Top 10 project page to find the latest edition.

[[Top 10 {{{year}}}-Note About Risks|← Note About Risks]]
[[Top 10 {{{year}}}-Table of Contents | {{{year}}} Table of Contents]]

[[Top_10_{{{year}}}-Top 10|{{{year}}} Top 10 List]]

 
Top 10 Risk Factor Summary

The following table presents a summary of the 2013 Top 10 Application Security Risks, and the risk factors we have assigned to each risk. These factors were determined based on the available statistics and the experience of the OWASP Top 10 team. To understand these risks for a particular application or organization, you must consider your own specific threat agents and business impacts. Even egregious software weaknesses may not present a serious risk if there are no threat agents in a position to perform the necessary attack or the business impact is negligible for the assets involved.


RISK Threat Agents Attack Vectors Security Weakness Technical Impacts Business Impacts
A1 Injection  EASY COMMON AVERAGE SEVERE  
A2 Authentication  AVERAGE WIDESPREAD AVERAGE SEVERE  
A3 XSS  AVERAGE VERY WIDESPREAD EASY MODERATE  
A4 Insecure DOR  EASY COMMON EASY MODERATE  
A5 Config  EASY COMMON EASY MODERATE  
A6 Sens. Data  EASY UNCOMMON AVERAGE SEVERE  
A7 Function Acc.  EASY COMMON AVERAGE MODERATE  
A8 CSRF  AVERAGE COMMON AVERAGE MODERATE  
A9 Components  AVERAGE WIDESPREAD DIFFICULT MODERATE  
A10 Redirects  AVERAGE UNCOMMON EASY MODERATE  
Additional Risks to Consider

The Top 10 cover a lot of ground, but there are other risks that you should consider and evaluate in your organization. Some of these have appeared in previous versions of the Top 10, and others have not, including new attack techniques that are being identified all the time. Other important application security risks (in alphabetical order) that you should also consider include:


[[Top 10 {{{year}}}-Note About Risks|← Note About Risks]]
[[Top 10 {{{year}}}-Table of Contents | {{{year}}} Table of Contents]]

[[Top_10_{{{year}}}-Top 10|{{{year}}} Top 10 List]]

 

© 2002-{{{year}}} OWASP Foundation This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license. Some rights reserved. CC-by-sa-3 0-88x31.png
[[Category:OWASP Top Ten {{{year}}} Project]]