This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Incomplete Blacklist"
From OWASP
(3 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
− | {{ | + | {{template:CandidateForDeletion}} |
+ | #REDIRECT [[Positive_security_model]] | ||
− | |||
==Description== | ==Description== | ||
Line 13: | Line 13: | ||
==Related Vulnerabilities== | ==Related Vulnerabilities== | ||
− | |||
==Related Countermeasures== | ==Related Countermeasures== | ||
==Categories== | ==Categories== | ||
− | |||
− |
Latest revision as of 18:18, 11 April 2009
#REDIRECT Positive_security_model
Description
NOTE: This probably should be made into a principle - Don't use blacklist. New attacks are being developed everyday, which makes it difficult or nearly impossible in some cases to make a complete blacklist. Instead positive whitelist, which specifies what is allowed, should be used.