OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration

OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration
OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration
English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 0h 27m | 199 MB

Security-related incidents pose major threats to organizations of all sizes, as well as the customers they serve. The Open Web Application Security Project (OWASP) was formed to educate the public about some of the most common security vulnerabilities. OWASP also provides a list—the OWASP top ten—that highlights the most critical security risks out there. In this course, Caroline Wong explores broken access control and security misconfiguration, the fifth and sixth categories of security vulnerabilities in the OWASP Top 10. Caroline explains how these threats work and provides real-life examples of how they can impact companies and consumers. Plus, she provides techniques that can help you prevent broken access control and security misconfiguration from impacting your organization.

Table of Contents

Introduction
1 Prevent common security vulnerabilities

Broken Access Control How Does It Work
2 General concept

Impact of Broken Access Control
3 Example scenario 1
4 Example scenario 2

Preventing Broken Access Control
5 Properly implement access controls
6 Logging and alerting
7 Manual testing

Security Misconfiguration How Does It Work
8 General concept

Impact of Security Misconfiguration
9 Example scenario 1
10 Example scenario 2

Preventing Security Misconfiguration
11 Harden all systems
12 Patch and update software
13 Test configurations

Conclusion
14 Next steps