This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Category:Control"
m (Reverted edits by Frank Alexander (talk) to last revision by KirstenS) |
m |
||
Line 1: | Line 1: | ||
This category is a parent category used to track categories of controls (or countermeasure, security mechanisms). | This category is a parent category used to track categories of controls (or countermeasure, security mechanisms). | ||
+ | |||
+ | {{Social Media Links}} | ||
==What is a control== | ==What is a control== |
Revision as of 18:30, 9 December 2011
This category is a parent category used to track categories of controls (or countermeasure, security mechanisms).
What is a control
Controls are defensive technologies or modules that are used to detect, deter, or deny attacks. Necessary controls in an application should be identified using Threat modeling to ensure that the application is protected against common types of attacks based on the threats it faces. A weakness or design flaw of a control, or the lack of a necessary controls results in a vulnerability that can make the application susceptible to attacks.
Examples of controls
- Authentication
- Authorization
- Session Management
- Input Validation
- Error Handling
- Logging
- Cryptography
How to add a new Control article
You can follow the instructions to make a new Control article. Please use the appropriate structure and follow the Tutorial. Be sure to paste the following at the end of your article to make it show up in the Control category:
[[Category:Control]]
Subcategories
This category has the following 11 subcategories, out of 11 total.
A
C
E
I
L
S
Pages in category "Control"
The following 33 pages are in this category, out of 33 total.