Statements (42)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:list
|
gptkbp:aims_to |
Raise awareness of security risks
|
gptkbp:available_at |
gptkb:owasp.org
|
gptkbp:describes |
Top ten web application security risks
the ten most critical web application security risks |
gptkbp:first_published |
gptkb:2003
|
https://www.w3.org/2000/01/rdf-schema#label |
OWASP Top Ten
|
gptkbp:includes |
Injection
Cross-Site Scripting (XSS) Broken Access Control Broken Authentication Insecure Deserialization Insufficient Logging & Monitoring Security Misconfiguration Sensitive Data Exposure Using Components with Known Vulnerabilities XML External Entities (XXE) |
gptkbp:is_cited_in |
Security best practices
Security policies Risk assessments Development guidelines Security audits Incident response plans Security frameworks Compliance frameworks Security assessments Threat modeling Security training materials Software development life cycle (SDLC) Vulnerability management processes Dev Sec Ops practices Application security programs Penetration testing methodologies |
gptkbp:is_part_of |
gptkb:OWASP_Foundation
|
gptkbp:is_reviewed_by |
Security experts
|
gptkbp:is_used_by |
gptkb:developers
gptkb:organization Security professionals |
gptkbp:published_by |
gptkb:OWASP
|
gptkbp:updates |
gptkb:2021
|
gptkbp:bfsParent |
gptkb:Google_Cloud_Security_Scanner
|
gptkbp:bfsLayer |
5
|