This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Bounds Checking"
From OWASP
Line 49: | Line 49: | ||
* [[Vulnerability 1]] | * [[Vulnerability 1]] | ||
* [[Vulnerabiltiy 2]] | * [[Vulnerabiltiy 2]] | ||
− | |||
− | |||
Line 58: | Line 56: | ||
* [[Control 2]] | * [[Control 2]] | ||
− | |||
==References== | ==References== |
Revision as of 19:02, 27 October 2008
This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.
This is a control. To view all control, please see the Control Category page.
ASDR Table of Contents
Last revision (mm/dd/yy): 10/27/2008
Description
A control (countermeasure or security control) is a protection mechanism that prevents, deters, or detects attacks, or prevents or reduces vulnerabilities.
- Start with a one-sentence description of the control
- How does the countermeasure work?
- What are some examples of implementations of the control (steer clear of specific products)
Risk Factors
- Talk about the factors that this control affects
- What effect does this countermeasure have on the attack or vulnerability?
- Does this control reduce the technical or business impact?
Difficulty to Implement
- Discuss the typical difficulty of implementing this control, emphasizing the factors that make it easier or harder
- Steer clear of language/platform specific information here
Examples
Short example name
- A short example description, small picture, or sample code with links
Short example name
- A short example description, small picture, or sample code with links
Related Attacks
Related Vulnerabilities
Related Controls
References
TBD