This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Top 10 2013-Details About Risk Factors
NOTE: THIS IS NOT THE LATEST VERSION. Please visit the OWASP Top 10 project page to find the latest edition.
[[Top 10 {{{year}}}-Note About Risks|← Note About Risks]] | [[Top_10_{{{year}}}-Top 10|{{{year}}} Top 10 List]] |
Top 10 Risk Factor Summary
The following table presents a summary of the 2013 Top 10 Application Security Risks, and the risk factors we have assigned to each risk. These factors were determined based on the available statistics and the experience of the OWASP Top 10 team. To understand these risks for a particular application or organization, you must consider your own specific threat agents and business impacts. Even egregious software weaknesses may not present a serious risk if there are no threat agents in a position to perform the necessary attack or the business impact is negligible for the assets involved. TABLE GOES HERE TABLE GOES HERE TABLE GOES HERE TABLE GOES HERE TABLE GOES HERE TABLE GOES HERE
|