Video Description

This lesson covers mitigations, countermeasures and defenses. There are several issues in the defenses category and each have their own mitigation techniques. This unit discusses the following mitigations: [5] CWE-306 Missing Authentication for Critical Function [10] CWE 807: Reliance on Untrusted Inputs in a Security Decision [11] CWE 250: Execution with unnecessary privileges [15] CWE 863: incorrect authorization [17] CWE-732: Incorrect Permission Assignment for Critical Resource

Course Modules

Secure Coding