This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Top 10 2013-Note About Risks"
| Line 1: | Line 1: | ||
| − | {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|title=Start Your Application Security Program Now|number=whole|year=2013}} | + | {{Top_10_2013:TopTemplate |
| + | |usenext=2013NextLink | ||
| + | |next=Details About Risk Factors | ||
| + | |useprev=2013PrevLink | ||
| + | |prev=What's Next for Organizations | ||
| + | }} | ||
| + | |||
| + | {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|title=What Changed From 2010 to 2013?|number=whole|width=100%|year=2013}}{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|title=Start Your Application Security Program Now|number=whole|year=2013}} | ||
Although the 2007 and earlier versions of the OWASP Top 10 focused on identifying the most common “vulnerabilities,” the OWASP Top 10 has always been organized around risks. This has caused some understandable confusion on the part of people searching for an airtight weakness taxonomy. The OWASP Top 10 for 2010 clarified the risk-focus in the Top 10 by being very explicit about how threat agents, attack vectors, weaknesses, technical impacts, and business impacts combine to produce risks. This version of the OWASP Top 10 follows the same methodology. | Although the 2007 and earlier versions of the OWASP Top 10 focused on identifying the most common “vulnerabilities,” the OWASP Top 10 has always been organized around risks. This has caused some understandable confusion on the part of people searching for an airtight weakness taxonomy. The OWASP Top 10 for 2010 clarified the risk-focus in the Top 10 by being very explicit about how threat agents, attack vectors, weaknesses, technical impacts, and business impacts combine to produce risks. This version of the OWASP Top 10 follows the same methodology. | ||
| Line 12: | Line 19: | ||
The following illustrates our calculation of the risk for A3: Cross-Site Scripting, as an example. Note that XSS is so prevalent that it warranted the only ‘VERY WIDESPREAD’ prevalence value. All other risks ranged from widespread to uncommon (values 1 to 3). | The following illustrates our calculation of the risk for A3: Cross-Site Scripting, as an example. Note that XSS is so prevalent that it warranted the only ‘VERY WIDESPREAD’ prevalence value. All other risks ranged from widespread to uncommon (values 1 to 3). | ||
| − | |||
{{Top_10_2013:BottomTemplate | {{Top_10_2013:BottomTemplate | ||
|type={{Top_10_2010:StyleTemplate}} | |type={{Top_10_2010:StyleTemplate}} | ||
|usenext=2013NextLink | |usenext=2013NextLink | ||
| − | |next= | + | |next=Details About Risk Factors |
|useprev=2013PrevLink | |useprev=2013PrevLink | ||
| − | |prev=What's Next for | + | |prev=What's Next for Organizations |
}} | }} | ||
Revision as of 18:57, 26 February 2013
NOTE: THIS IS NOT THE LATEST VERSION. Please visit the OWASP Top 10 project page to find the latest edition.
| [[Top 10 {{{year}}}-What's Next for Organizations|← What's Next for Organizations]] | [[Top_10_{{{year}}}-Top 10|{{{year}}} Top 10 List]] |
[[Top 10 {{{year}}}-Details About Risk Factors|Details About Risk Factors →]] |
|
What Changed From 2010 to 2013?
|