Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This lesson covers mitigations, countermeasures and defenses. There are several issues in the defenses category and each have their own mitigation techniques. This unit discusses the following mitigations:  CWE-306 Missing Authentication for Critical Function  CWE 807: Reliance on Untrusted Inputs in a Security Decision  CWE 250: Execution with unnecessary privileges  CWE 863: incorrect authorization  CWE-732: Incorrect Permission Assignment for Critical Resource