This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Automation Threats to Web Applications"
(→What is OWASP Automation Threats to Web Applications?: What is... updated) |
(Extended license description/ Hid unpopulated sections) |
||
| Line 19: | Line 19: | ||
==Licensing== | ==Licensing== | ||
| − | Creative Commons Attribution ShareAlike 3.0 | + | All the materials are free to use. They are licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. |
| + | |||
| + | © OWASP Foundation | ||
| + | |||
| + | |||
<!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --> | <!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --> | ||
| Line 36: | Line 40: | ||
* Non application | * Non application | ||
| − | == Presentation == | + | <!-- == Presentation == |
| − | * Due May 2015 | + | * Due May 2015 --> |
== Project Leader == | == Project Leader == | ||
| Line 45: | Line 49: | ||
| − | == Related Projects == | + | <!-- == Related Projects == |
| − | + | --> | |
| − | |||
| − | |||
| Line 55: | Line 57: | ||
<!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --> | <!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --> | ||
| valign="top" style="padding-left:25px;width:200px;" | | | valign="top" style="padding-left:25px;width:200px;" | | ||
| − | |||
| − | |||
| − | |||
== News and Events == | == News and Events == | ||
| Line 64: | Line 63: | ||
* [27 Feb 2015] Work underway | * [27 Feb 2015] Work underway | ||
| − | == In Print == | + | <!-- == In Print == --> |
| − | + | <!-- == Quick Download == --> | |
| − | |||
==Classifications== | ==Classifications== | ||
Revision as of 18:12, 26 March 2015
|
The OWASP Automation Threats to Web ApplicationsThis project brings together research and analysis of real world automated attacks against web applications, to produce documentation to assist operators defend against these threats. Sector-specific guidance is available. DescriptionLicensingAll the materials are free to use. They are licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. © OWASP Foundation
|
What is this?Information and resources to help web application owners defend against automated threats What isn't this?
Project Leader
|
News and Events
Classifications
| ||||||
Contributors
The project's roadmap was updated in March 2015:
- Feb-March 2015: Research on automated threats to web applications
- April 2015: Application owner interviews and creation of initial project outputs
- May 2015: Publication of outputs and request for review/data
- Jun-Sep 2015: Gathering of additional contributions, updates to outputs, and translations.
Can you help? The project is looking for information on the prevalence and types of automated threats seen by web application owners in the real world. This will be used to refine and organise the information gathered from research papers, whitepapers, security reports and industry news. If you would like to find out more, or have knowledge to contribute, please contact, me directly or using the project's mailing list:
- Colin Watson
- (awaiting project mailing list to be set up)

