• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.005 ■ Spring 2021 ■ Wade Mackey
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Participation
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Cyberattack: The Maersk Global Supply-Chain Meltdown
    • Team Project – Updated 3/31/2020
  • Harvard Coursepack
  • Gradebook

OWASP Top 10

March 19, 2020 by Wade Mackey 23 Comments

Filed Under: 10 - Application Security Tagged With:

Reader Interactions

Comments

  1. Zeynep Sahin says

    March 20, 2020 at 5:16 pm

    OWAPS (Open Web Application Security project is an international non-profit organization working on web application security. OWAPS top 10 is their best-known project. The OWAPS Top 10 focusing on the 10 most critical risks is updated regularly. This document is recommended to be used as an “awareness document” by organizations to mitigate security risks. The document includes both attack scenarios and prevention methods related to 10 risks below:
    1. Injection
    2. Broken Authentication
    3. Sensitive Data Exposure
    4. XML External Entities (XXE)
    5. Broken Access control
    6. Security misconfigurations
    7. Cross Site Scripting (XSS)
    8. Insecure Deserialization
    9. Using Components with known vulnerabilities
    10. Insufficient logging and monitoring

    Log in to Reply
    • Natalie Dorely says

      March 22, 2020 at 8:09 pm

      Hi Zeynep!

      These 10 risks are so important to be aware of. As IT Auditors, this can be an example of how different risks affect web applications.

      Best,
      Natalie

      Log in to Reply
    • Innocent says

      March 23, 2020 at 9:01 am

      Hey Zeynep,

      Thanks for listing OWASP top 10 application security risk. Due to increasing attacks and regulatory pressures, organizations must establish effective processes and capabilities for securing their applications and APIs. OWASP recommends organizations establish an application security program to gain insight and improve security across their applications and APIs. Gaining strong application security requires many different parts of an organization to work together efficiently, including security and audit, software development, business, and executive management. Firms must focus on the activities and outcomes that help improve enterprise security by eliminating or reducing risk.

      Log in to Reply
  2. Innocent says

    March 21, 2020 at 4:18 pm

    As IT Auditing & Cybersecurity professionals, it’s necessary for us to understand the environment to be protected, and in doing this, we should consider providing adequate physical security for servers and clients and hardening the operating systems with patches and high-security configuration settings.
    It is also our duty to advise the firms we’ll work with to avoid loading too many applications on a single host, because fewer applications mean fewer opportunities to take over the computer.
    Most importantly, the security baseline should always guide us because it will describe how to create a secure configuration in general.

    Log in to Reply
    • Percy Jacob Rwandarugali says

      March 24, 2020 at 8:27 am

      Right on point Innocent, loading many applications on a single system exposes your host to exponential threats. Its wise to keep fewer applications running because then you are able to easily secure and monitor their usage. Furthermore, i agree with you that baselines guide us on how to create secure configurations on general.

      Log in to Reply
  3. Numneung Koedkietpong says

    March 22, 2020 at 11:24 am

    OWASP Top 10 provides security concerns on web application security which are related to ten most significant risks. According to the reading, each application security risk illustrates how attackers use this technique to compromise the system, vulnerabilities which allow hackers to gain intrusion, examples attack scenarios, and how to prevent the issue. One key point that I picked from the reading is injection attack. Hackers use this technique by putting untrusted input coding (SQL, XML) to the program. It causes data loss, corruption, or disclosure to unauthorized parties. Using a safe API or whitelist server-side input validation are examples to prevent injection attacks.

    Log in to Reply
    • Akshay Shendarkar says

      March 24, 2020 at 11:30 pm

      Hello Num,

      You have correctly mentioned that OWASP top 10 gives good description of the top most vulnerabilities in web applications and how they can be exploited by attackers, with illustrative examples. Specifically talking about injection attack, it is a very broad term, as it can be exploited at every instance where an input is required from the client/user. Due to its vast nature and high amount of skills required even for developers to overcome it, it is consistently ranked among the top most security vulnerabilities. The best remedy for this attack is input sanitization as you mentioned, where developers provide very specific instructions on the kind of data an user can input to the application.

      Log in to Reply
  4. Percy Jacob Rwandarugali says

    March 22, 2020 at 1:18 pm

    OWASP (Open Web Application Security Project) is an organization that provides unbiased and practical, cost-effective information about computer and Internet applications.

    Frames works like the PCI DSS heavily relay on OWASP to determine the level of security of your web application. For instance, a merchant cannot pass a ROC (Report on compliance) if any of the top 10 OWASP vulnerabilities appear on vulnerability assessment report of the web application.

    The OWASP Top 10 list consists of the 10 most seen application vulnerabilities and these include; Injection, Broken Authentication, Sensitive data exposure, XML External Entities (XXE), Broken Access control, Security misconfigurations, Cross-Site Scripting (XSS), Insecure Deserialization, Using Components with known vulnerabilities, Insufficient logging and monitoring.

    Log in to Reply
    • Alexander Reichart-Anderson says

      March 24, 2020 at 12:03 pm

      Hi Percy, thanks for uncovering some fundamental details from the OSWAP top 10. I find it interesting that many of the applications and backend softwares we use on a regular basis require the guidance of major guidelines and policies for their security procedures. In addition, OSWAP did a great job of outlining the top 10 application vulnerabilities which plague the security world because of built in flaws to the generic frameworks of applications. So, as auditors, we need to be vigilant of these vulnerabilities and lockdown the back door gateways into the systems we oversee.

      Log in to Reply
  5. Joseph Nguyen says

    March 22, 2020 at 5:12 pm

    OWASP (Open Web Application Security Project) is a very good tool along with WebGoat to practice solving and understand the top 10 or top 25 web application vulnerabilities. You must know scripting languages and SQL as well.

    Log in to Reply
  6. Imran Jordan Kharabsheh says

    March 22, 2020 at 7:27 pm

    Through reading through the Open Web Application Security Project (OWASP)’s Top Ten Publication, developed by and for web application developers and security experts, meant to spread awareness of the generally accepted list of most threatening risks to web applications, I developed a better understanding of the threat landscape from a Web Application Developer’s perspective. Among the newer forms of vulnerabilities that I learned about while reading this publication is Insecure Deserialization, which refers to the process of transforming a formatted data set, particularly one from an unverified source, into an object. The risks associated with this include remote code execution, code injection, or privilege escalation attacks.

    Log in to Reply
  7. Natalie Dorely says

    March 22, 2020 at 7:58 pm

    One takeaway I took from this document is the vulnerability of applications. This document explains specific criterias that will allow an application to be vulnerable to attack such as: (quoted in the document) user supplied data is not validated, filtered, or sanitized by the application; dynamic queries or non-parameterized calls without context-aware escaping are used directly in the interpreter., etc.

    Log in to Reply
    • Imran Jordan Kharabsheh says

      March 23, 2020 at 3:39 pm

      Reading through your thoughts on the OWASP’s Top Ten publication, I can tell that you’ve been spending time looking at data-oriented threats that interact directly with the database that have the potential of doing irreversible damage. It should also be noted that this can directly in with Broken Access Controls, which is another threat mentioned in the Top Ten. Having insufficient or unenforced access controls can easily create opportunities for injection into an organization’s information systems.

      Log in to Reply
  8. Christopher James Lukens says

    March 22, 2020 at 8:07 pm

    OWASP top 10 is a document for for developers ans security professionals that brings a consensus of the most applicable security risks to organizations. Being aware of this document is critical because it explains the most common attacks and how to remediate against them. by using the top 10 in your development process you can remove common mistakes that would leave vulnerabilities in your code. Each item in the top 10 list is a good vulnerability to check while testing to make sure the the code is truly secure. Here are the top ten vulnerabilities once again.
    1) Injection
    2) Broken Authentication
    3) Sensitive data exposure
    4)External entities
    5) Broken access control
    6) Security misconfiguration
    7) Cross site scripting
    8) Insecure de serialization
    9) Using components with known vulnerabilities
    10) Insufficient logging and monitoring

    Log in to Reply
    • Sarah Puffen says

      March 24, 2020 at 11:59 am

      This document is definitely important to developers and security professions, as it can help add in security during the development phase rather than waiting until the very end to consider it. I think it’s also important for upper management, or anyone that isn’t necessarily familiar with the intricacies of securing web apps, to consider reading the guidelines in order to help them understand more about the risks involved with web applications.

      Log in to Reply
  9. Akshay Shendarkar says

    March 22, 2020 at 8:25 pm

    This document presents descriptions of the top ten attacks that can be caused due to various existing vulnerabilities in web applications for the year 2017 as per the Open Web Application Security Project (OWASP). These attacks are reviewed, and new list is produced annually. Not only are these attack vectors useful for software developers in writing and producing more secure code, they are extremely helpful for security professionals. As a penetration tester, these top 10 attacks provide a baseline against which an application can be tested. For IT Auditors and compliance professionals, it is helpful to assess whether the application is reasonably secure if the risks arising due to these 10 attacks are mitigated in an application.

    Log in to Reply
    • Junjie Han says

      March 24, 2020 at 10:01 pm

      Yes, as an IT auditor, OWASP provides cases and data and solutions that can help auditors achieve more accurate results in risk assessment and judgment.

      Log in to Reply
  10. Sarah Puffen says

    March 22, 2020 at 11:34 pm

    OWASP Top 10 Web Application Security Risks is an important document for professionals to consider when evaluating an organization’s application security. One key element I found was the Risk Factor Summary on pg. 22. I think it’s useful to see the impact analysis and risk rating in a more condensed matrix, as it’s easier to understand why each risk is ranked the way that it is. However, since this is based off of whatever statistic were available at the time, each organization will have different impact rating for each security risk.

    Log in to Reply
  11. Alexander Reichart-Anderson says

    March 22, 2020 at 11:50 pm

    In the OSWAP Top 10 guidelines, I believe the most important section was the diagram which showed the most common path that attackers use to access a vulnerable machines. The “attacks agents” take advantage of a certain attack vector. Then through the vector they attack a weakness which has not been covered by the security auditors or security admin. They then take advantage of a certain security control or a technical impact. The impact is a certain function that will give the attacker access to assets that have a very particular business impact.

    This path is the most commonly used by attackers and should serve as the map for IT auditors to protect against. We can all use this map to protect the information assets we are incharge of.

    Log in to Reply
    • Peiran Liu says

      March 25, 2020 at 10:46 am

      Hi Alexander,

      If attackers use this as a map to attack, they might have success on smaller companies. But with a well funded big company, vulnerabilities mentioned in OSWAP Top 10 will be the most prioritized for company to fix which means it will be harder for attackers.

      Log in to Reply
  12. Innocent says

    March 23, 2020 at 5:14 am

    According to this document, the open web application security project focuses on identifying the most serious web application security risk for a broad array of organizations. It is important to note that each organization is unique, and so are the threat actors for that organization, their goals, security consciousness, and the impact of any breach. It is necessary to understand the risk to your organization based on applicable threat agents and business impacts. Example: A common seen issue like security misconfiguration occur due to insecure default configurations, incomplete or ad hoc configurations, open cloud storage, misconfigured HTTP headers, and verbose error messages containing sensitive information. So, it is absolutely necessary to securely configure all operating systems, frameworks, libraries, applications, and the systems must be patched and upgraded in time.

    Log in to Reply
  13. Junjie Han says

    March 23, 2020 at 8:41 pm

    The main purpose of OWASP Top 10 is to let developers, designers, architects, and organizations understand the consequences of the most common web application security vulnerabilities. The top 10 provide basic methods to protect these vulnerabilities-a great start to your secure coding security program. The existence of OWASP regulates the operations of IT staff, thereby achieving vigilance. When IT personnel meet the operations given by OWASP, IT risk will be controlled to a lower level. For example, Injection: When the data is not adequately inspected, this may cause the web server to include, process, or invoke arbitrary remote and malicious content. This allows the attacker to perform:1.Remote code execution.2.Installation of remote root kit and complete system compromise.

    Log in to Reply
  14. Peiran Liu says

    March 25, 2020 at 10:39 am

    The Open Web Application Security Project is an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.

    The key takeaway from the article is from A5, broken access control. The way access control work is that access control is only effective if enforced in trusted server-side code or server-less API, where the attacker cannot modify the access control check or metadata, which means one of the best way to prevent it is to deny by default. But developers and QA staffs should be include functional access control unit and integration tests which means a good management structure and a good security awareness is also important or attackers can have access with manipulating one of the developers.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (2)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (6)
  • 13 – Review (1)
  • 13 – Team Project Presentations and Review for Final (1)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in