The section is the first of two parts covering the OWASP project. The acronym stands for Open Web Application Security Project, which is a group that covers threats targeting web apps. They maintain a David Letterman style top-10 list of the most common exploits targeting web apps. We cover threats 1-5 in this video. Several databases in addition to OWASP are maintained for software security threats: - CVE (Common Vulnerabilities) - CWE (Common weaknesses enumeration) - NVD (national vulnerability databases) - US CERT (Computer Emergency Response Team) We then discuss mitigating strategies for common exploits with the most common exploit being code injection.
They are responsible for knowing where a network's possible vulnerabilities are and providing mitigation strategies to combat them. An effective Cyber Security Operations Manager will have experience in a technical security role including ...