This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "User talk:Raghavendra Rao PV"

From OWASP
Jump to: navigation, search
m (Welcome!)
 
(Web Application Security - Part I: new section)
Line 3: Line 3:
 
You will probably want to read the [[Help:Contents|help pages]].
 
You will probably want to read the [[Help:Contents|help pages]].
 
Again, welcome and have fun! [[User:KateHartmann|KateHartmann]] 15:51, 31 May 2011 (EDT)
 
Again, welcome and have fun! [[User:KateHartmann|KateHartmann]] 15:51, 31 May 2011 (EDT)
 +
 +
== '''Web Application Security - Part I''' ==
 +
 +
Data or information can be globally accessed by individuals through the Internet. Depending on the criticality levels, data may be classified as: Critical, Highly Confidential, Confidential or Public. Such data/information residing at the servers will be managed by an Administrator or a group of administrators.
 +
 +
Web Applications designed and developed by an organization too serves a similar purpose and data classification approach.
 +
1. Showcase the capabilities of the organization
 +
2. Grant access to internal users/employees
 +
3. Grant access to external users/customers
 +
 +
Customers/Organizations are at a constant risk of their sensitive data being exploited by unwanted users. Such users pose a threat to organizations by identifying loopholes/vulnerabilities in the web applications and exposing these vulnerabilities on the Internet. Doing so will bring down the reputation of these organizations in the show business. Hence to summarize, the major risks associated by showcasing an organizations information on the Internet can be considered to be:
 +
1. Threat of misuse by individuals
 +
2. Reputation of the organization
 +
 +
There came the urge to protect sensitive information from being disclosed out in the public via Internet. Individuals/Customers/Clients/Organizations started demanding the development community to build them SECURE softwares to overcome the already existing list of attack scenarios.
 +
 +
BRB,
 +
** RRPV **

Revision as of 16:37, 10 November 2011

Welcome to OWASP! We hope you will contribute much and well. You will probably want to read the help pages. Again, welcome and have fun! KateHartmann 15:51, 31 May 2011 (EDT)

Web Application Security - Part I

Data or information can be globally accessed by individuals through the Internet. Depending on the criticality levels, data may be classified as: Critical, Highly Confidential, Confidential or Public. Such data/information residing at the servers will be managed by an Administrator or a group of administrators.

Web Applications designed and developed by an organization too serves a similar purpose and data classification approach. 1. Showcase the capabilities of the organization 2. Grant access to internal users/employees 3. Grant access to external users/customers

Customers/Organizations are at a constant risk of their sensitive data being exploited by unwanted users. Such users pose a threat to organizations by identifying loopholes/vulnerabilities in the web applications and exposing these vulnerabilities on the Internet. Doing so will bring down the reputation of these organizations in the show business. Hence to summarize, the major risks associated by showcasing an organizations information on the Internet can be considered to be: 1. Threat of misuse by individuals 2. Reputation of the organization

There came the urge to protect sensitive information from being disclosed out in the public via Internet. Individuals/Customers/Clients/Organizations started demanding the development community to build them SECURE softwares to overcome the already existing list of attack scenarios.

BRB,

    • RRPV **