Cyber Security: 10 OWASP Insights You Can’t Miss!

December 19, 2023
1 min read


Cyber Security: What are the OWASP top 10? Explained over a beer at the pub! Patty C discusses the OWASP top 10, a list of the most critical web application security risks. The article covers the main elements of the OWASP top 10 and highlights the importance of understanding these risks in the field of cyber security.

Key Points:

  • OWASP top 10 is a list of the most critical web application security risks.
  • Understanding these risks is important in the field of cyber security.

The article focuses on the 2017 version of the OWASP top 10, which includes injection, broken authentication, sensitive data exposure, XML external entities (XXE), and more. The author uses relatable examples to explain these concepts, such as comparing injection to sliding a secret note to get extra fries at a pub.

Injection refers to tricking the computer into performing unauthorized actions, often by entering SQL or JS commands into application form fields. Broken authentication occurs when the system fails to verify the identity of users, allowing unauthorized access. Sensitive data exposure involves the unauthorized access to and use of private information, similar to someone snatching a napkin with your phone number written on it. XML external entities (XXE) utilize external information to interfere with system orders, similar to someone shouting their beer order to the bartender from outside the pub.

Other elements of the OWASP top 10 mentioned include security misconfigurations, cross-site scripting (XSS), insecure direct object references, security and logging, and insufficient logging and monitoring. The author encourages the reader to explore the latest 2021 version of the OWASP top 10 for a more comprehensive understanding of these risks.

In conclusion, the OWASP top 10 is a vital resource in the field of cyber security. Understanding these web application security risks can help developers and security professionals protect systems from potential vulnerabilities and attacks. By explaining the 2017 version of the OWASP top 10 in an engaging and relatable way, the article aims to create interest and encourage further exploration of the topic.


Latest from Blog

Bridging the cyber talent gap: tips for CISOs

TLDR: – Global cyber threats have increased twofold in recent years, leading to a talent gap of nearly 4 million cyber professionals worldwide. – Existing cyber staff are under strain, with vacancies

North Korean hackers pivot to ransomware attacks

TLDR: North Korean hackers from APT45 have shifted from cyber espionage to ransomware attacks APT45 has targeted critical infrastructure and is linked to ransomware families SHATTEREDGLASS and Maui A North Korea-linked threat