Video Description

In part 2 of the OWASP threat database we discuss top threats 6-10: - Sensitive data exposure - protecting data both at rest and in transit - Missing function level access control - access control methods - Cross site request forgery - session hijacking, use unique session tokens. - Known vulnerable component usage - avoid deprecated code or APIs - Unvalidated redirects and forwards - threats from phishing or malware sites We underscore that the importance of OWASP and other threat databases is to develop an awareness of the most common threats and then find ways to mitigate them.

Course Modules

ISC2 CISSP