• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2024 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 2a – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2b – Cryptography
      • Unit 3a – Secure Networks
      • Unit 3b – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 4b – Case Study 2 Data Breach at Equifax
      • Unit 5a – Access Control
      • Unit 5b Host Hardening
      • Unit 6a Application Security
      • Unit 6b Data Protection
      • Unit 7a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Team Project Instructions
  • Harvard Coursepack

OWASP Top 10

January 1, 2022 by Jose Gomez 25 Comments

Filed Under: 6a - Application Security Tagged With:

Reader Interactions

Comments

  1. Chun Liu says

    February 29, 2024 at 1:28 am

    Let’s start with OWASP, a non-profit organization, not affiliated with any business or consortium, that provides unbiased, factual, cost-effective information about computers and Internet applications. Its purpose is to assist individuals, businesses, and organizations to discover and use trusted software.
    The most authoritative aspect of the OWASP program is its “Top 10 Security Vulnerabilities List.” The OWASP Top 10 is not an official document or standard, but rather a widely adopted awareness document used to categorize the severity of web security vulnerabilities, and is currently being used by a number of vulnerability award platforms and corporate security teams to evaluate bug reports. This list summarizes the top 10 most likely, common, and dangerous vulnerabilities in web applications, and can help IT companies and development teams standardize their application development process and testing process to improve the security of web products

    Log in to Reply
  2. Xiaozhi Shi says

    February 29, 2024 at 7:12 am

    The Open Web Application Security Project® (OWASP) is a nonprofit foundation that works to improve the security of software. Through community-led open-source software projects, hundreds of local chapters worldwide, tens of thousands of members, and leading educational and training conferences, the OWASP Foundation is the source for developers and technologists to secure the web. The OWAPS Top 10 are their best-known projects. The OWAPS Top 10 pays attention to the 10 most critical risks and is continuously updated. It is being suggested that this document be used as an “awareness document” for organizations to reduce security risks. This document includes attack scenarios and prevention methods connected to the following 10 risks: Injection, Broken Authentication, Sensitive data exposure, XML External Entities (XXE), Broken Access control, Security misconfigurations, Cross-Site Scripting (XSS), Insecure Deserialization, through the use of Components with known vulnerabilities, Insufficient logging and monitoring.

    Log in to Reply
  3. Guanhua Xiao says

    February 29, 2024 at 8:02 am

    The Owens 10 refers to the ten critical security control points that are considered the most important measures to protect an organization’s assets from threats. These control points are designed to provide a framework to help organizations identify key areas in their security strategy and ensure that effective controls are in place in those areas. However, the needs and circumstances of each organization are unique, so the implementation of these control points needs to be tailored and customized to the specific situation.

    Log in to Reply
  4. Yawen Du says

    February 29, 2024 at 9:36 am

    OWASP Top 10 is a list of the top 10 most common and dangerous security vulnerabilities in Web applications, published by the Open Web Application Security Project. The purpose of this list is to help developers, security teams, and IT companies understand and protect against these vulnerabilities in order to improve the security of Web applications. Key topics include: injection, failed authentication and session management, sensitive data leakage, XML external entity injection (XXE), security misconfiguration, cross-site scripting (XSS), insecure deserialization, use of components with known vulnerabilities, inadequate logging and monitoring, and API security.

    Log in to Reply
  5. Shijie Yang says

    February 29, 2024 at 9:37 pm

    The key takeaway I learned from the OWASP Top 10 is that the core principle of OWASP is to be free and easy for any user to access. The Open Web Application Security Project (OWASP) is an international non-profit organization dedicated to Web application security. OWASP is regularly updated to report on Web application security issues, focusing on the 10 most important cyber risks. According to the report, the most common types of application security risks are injection, authentication failures, sensitive data breaches, XML external entities, and access control failures. For example, in injection, a cyberattack occurs when untrusted data is sent to the interpreter as a command. An attacker’s malicious data can trick the interpreter into executing unexpected commands or accessing the data without the proper authorization protocol.

    Log in to Reply
  6. Xinyi Peng says

    February 29, 2024 at 9:50 pm

    The “Owens 10” likely refers to a set of security controls outlined by a particular individual or organization named Owens. However, it’s worth noting that the most widely recognized set of critical security controls is known as the “CIS Critical Security Controls” (formerly known as the SANS Top 20 Critical Security Controls). These controls are a prioritized set of best practices developed by a community of cybersecurity experts to help organizations improve their cybersecurity posture and mitigate common threats effectively.

    Log in to Reply
  7. Zhang Yunpeng says

    February 29, 2024 at 10:39 pm

    The OWASP Top 10, an internationally recognized list compiled by the Open Web Application Security Project (OWASP), highlights the ten most common and critical security vulnerabilities in web applications. This list serves as a valuable resource for developers, security teams, and IT companies to understand and mitigate these vulnerabilities, thereby enhancing the overall security of web-based systems. Key vulnerabilities identified by the OWASP Top 10 include injection, failed authentication and session management, sensitive data leakage, XML external entity injection (XXE), security misconfiguration, cross-site scripting (XSS), insecure deserialization, use of components with known vulnerabilities, inadequate logging and monitoring, and API security. The OWASP’s core principle is accessibility and ease of use for all users, making it a free and invaluable resource for the web application security community. Regular updates ensure that the latest security issues and cyber risks are addressed, with a focus on the ten most significant threats. For instance, injection vulnerabilities occur when untrusted data is passed to an interpreter as a command, allowing attackers to execute unauthorized commands or access sensitive data. By understanding and addressing these vulnerabilities, organizations can significantly improve the security posture of their web applications.

    Log in to Reply
  8. Yujie Cao says

    February 29, 2024 at 11:40 pm

    OWASP Top 10 is an awareness documents for securing the application. It could be used as a starting point for coding or testing. It contains the risk that the application would have rather how to test for those risks. The list of the OWASP Top 10 includes: Broken Access Controls, Cryptographic Failures, Injections, Insecure Design, Security Misconfiguration, Vulnerable and Outdated Components, Identification and Authentication Failures, Software and Data Integrity Failures, Security Logging and Monitoring Failures, and Server Side Request Forgery (SSRF).

    Log in to Reply
  9. Yuanjun Xie says

    March 1, 2024 at 2:55 am

    OWASP’s mission is to help organizations understand secure coding practices so their applications and APIs can be trusted. As the title implies, it lists 10 common application security risks. I found the +D section to be interesting, which gives developers tools and resources to use to encourage secure coding. It gives 5 sections: Application security requirements, application security architecture, standard security controls, secure development lifecycle, and application security education.
    It usually is a manual attack, target on week key generation and management, and weak algorithm, weak password hashing storage techniques. The information typically likes sensitive personal information data such as health records, credentials, personal data, and credit card information should be protected. The company can check if the application vulnerable by ensuring the encryption is enforced and the sensitive data stored in a clear text such as backups; Classify data processed, stored, or transmitted by an application. Identify which data is sensitive according to privacy laws, regulatory requirements, or business needs.

    Log in to Reply
  10. Shuting Zhang says

    March 1, 2024 at 4:40 am

    To determine the Top 10 Security Risks, OWASP adopts more data-driven approaches. They collect a large amount of data on various Common Weakness Enumerations (CWEs) and analyze them based on the prevalence of different CWEs in applications. They also select two categories from the OWASP community survey and combine CVSS exploit and impact scores to determine the severity and impact of these categories. This data-driven approach aims to provide more accurate and comprehensive risk assessments to help developers and security experts better protect their applications.

    Log in to Reply
  11. Hongli Ma says

    March 1, 2024 at 6:26 am

    The OWASP Top 10 lists the top ten most critical web application security risks. It is regularly updated by the Open Web Application Security Project (OWASP) community to reflect the current threat situation. This list helps organizations prioritize their security work and focus on mitigating the most common and influential vulnerabilities. The OWASP Top 10 includes risks such as injection, authentication failure, sensitive data exposure, XML external entities (XXE), access control failure, security configuration errors, cross site scripting (XSS), insecure deserialization, use of components with known vulnerabilities, and insufficient logging and monitoring. Understanding and addressing these risks is crucial for building secure web applications.

    Log in to Reply
  12. Shuyi Dong says

    March 1, 2024 at 9:01 am

    During this reading, I gained insight into OWASP’s guiding principles for all parties involved. These principles provide clear guidelines for developers, security testers, enterprise organizations, and application managers to take action to ensure that they follow best security practices when building and maintaining applications. For example, application managers need to ensure that security-related activities are built into the application’s budget to ensure that security investments are adequately safeguarded. Also, organizations need to determine the level of security protection required for their application portfolio based on current privacy laws and regulatory requirements.

    Security testers can utilize the OWASP Security Knowledge Framework and Application Security Validation Standards to develop test strategies that meet real-world needs. And developers can leverage the OWASP Software Assurance Maturity Model (SAMM) to customize the security of their software to meet the specific risks faced by their organization. This model helps development teams better understand and address potential security threats, leading to more effective security measures when building applications and APIs. These guiding principles not only provide clear direction for all participants, but also help to improve the security of the entire application ecosystem.

    Log in to Reply
  13. Haoran Wang says

    March 1, 2024 at 12:06 pm

    The ten most prevalent application vulnerabilities are listed in this document along with some basic defense strategies against these high-risk issue areas. Application security is required nowadays. Organizations need to set up efficient procedures and tools for protecting their apps and API in light of the growing number of assaults and regulatory demands. Effective collaboration among various organizational components, such as software development, security audit, and executive management, is necessary to achieve application security. Adopting this paper and initiating the process of making sure their web apps reduce hazards is something that companies should do.

    Log in to Reply
  14. Yiwei Hu says

    March 1, 2024 at 8:43 pm

    OWAPS is an international non-profit organization dedicated to Web application security. The OWAPS Top 10 is their most famous project. Focusing on the 10 most critical risks and updated regularly, OWAPS top 10 provides a detailed explanation of each risk issue, including how the problem occurs, whether the application is vulnerable, how to prevent it, and some case scenarios, which are considered important measures to protect users from threats.

    Log in to Reply
  15. Chenhao Zhang says

    March 1, 2024 at 9:45 pm

    The OWASP Top 10 Security Risks list lists the most critical security risks faced by web applications. It is compiled and maintained by the Open Web Application Security Project (OWASP), a global community dedicated to improving software security. The list is designed to help developers, security teams, and other stakeholders prioritize security efforts and mitigate the most significant risks to web application security.
    Here are the top 10 security risks for OWASP 2023:
    Injection: Injection flaws such as SQL, OS, and LDAP injection occur when you build SQL queries, operating system commands, or LDAP queries with untrusted data. Attackers can exploit these vulnerabilities to execute unauthorized commands or access unauthorized data.
    Invalid authentication: Weak or non-existent authentication mechanisms could allow attackers to compromise user accounts or access sensitive data. This includes issues such as using weak passwords, storing passwords unsecurely, or failing to implement multi-factor authentication.
    Sensitive data exposure: Applications often process sensitive data, such as financial information, personal health information, or authentication credentials. If this data is not properly protected, it can be leaked to unauthorized users.
    XML External Entity (XXE): XXE occurs when an application processes XML data from an untrusted source and allows references to external entities. An attacker can exploit this to read arbitrary files, perform network requests, or consume excessive resources.
    Interrupt access control: Applications often implement access control to restrict user access to certain resources or functions. If these controls are not implemented correctly, an attacker can access unauthorized resources or perform unauthorized actions.
    Security configuration errors: Applications and their underlying systems often have many security configurations that need to be set correctly. Misconfiguration can lead to serious security vulnerabilities, such as allowing remote code execution, enabling unnecessary services, or failing to apply security patches.
    Cross-site scripting (XSS): XSS occurs when an attacker injects a malicious script into a web application and then executes it in the context of a trusted user. This allows attackers to steal cookies, session tokens, or other sensitive information, or to perform other malicious actions on the user’s behalf.
    Unsafe deserialization: Applications often deal with serialized data, such as JSON, XML, or binary formats. If the deserialization process is not secure, an attacker can exploit this to execute unauthorized code or access sensitive data.
    Use components with known vulnerabilities: Applications often rely on third-party components, such as libraries, frameworks, or plug-ins. If these components have known vulnerabilities that have not been patched, an attacker can exploit these vulnerabilities to compromise the application.
    Inadequate logging and monitoring: Inadequate logging and monitoring can make it difficult to detect and respond to security events. Applications should have comprehensive logging to capture all relevant security events and allow for easy analysis and correlation.

    Log in to Reply
  16. Chunqi Liu says

    March 2, 2024 at 6:03 am

    In OWASP Top 10 – 2017, I like how it should change between 2013 and 2017. It, not only list the top ten risks but also shows the explanation of the risk, vulnerabilities, the method of prevention, and lists different attack scenarios with references. One of the parts I find interest is sensitive data exposure. It usually is a manual attack, target on week key generation and management, and weak algorithm, weak password hashing storage techniques. The information typically likes sensitive personal information data such as health records, credentials, personal data, and credit card information should be protected. The company can check if the application vulnerable by ensuring the encryption is enforced and the sensitive data stored in a clear text such as backups; Classify data processed, stored, or transmitted by an application. Identify which data is sensitive according to privacy laws, regulatory requirements, or business needs.

    Log in to Reply
  17. Hao Zhang says

    March 2, 2024 at 7:51 am

    From the OWASP Top 10, I learned that it focuses on recognizing the most high-risk web application for most organizations. Each risk contain information about the likelihood and technical impact using the OWASP Risk rating methodology. By using OWASP Risk Assessment Framework’s Static Application Security Testing tool, companies are able to analyze their code quality and vulnerabilities. OWASP Risk Assessment Framework can be integrated into the DevSecOps toolchain to help developers to write and produce secure code. The OWASP method maps out how different paths using different applications could do different harm, each path represents a risk that either requires attention or could be neglected. Thus, orgs must evaluate the likelihood associated with each threat.

    Log in to Reply
  18. Yue Wang says

    March 2, 2024 at 7:56 am

    OWASP has provided us with a lot of vulnerability information, and the top ten vulnerabilities he has selected are among the larger ones, which have greatly assisted us in carrying out our security work, focusing our attention on the relevant vulnerabilities, and coordinating our resources to prioritise the resolution of critical security issues.
    As a network security workers, usually a lot of energy will be concerned about this SWASP TOP 10 content, and will be used as an important basis for guiding the judgement of the security of the application system, through continuous updating, learning and rectification of the relevant issues, to better ensure that the information system’s safe and stable operation, and to ensure that the maximum will not occur SQL injection, XSS, and other security issues, which leads to Database leakage or tampering of customer systems

    Log in to Reply
  19. Xuanwen Zheng says

    March 2, 2024 at 8:24 am

    The top 10 most common and most dangerous security vulnerabilities in Web applications include: injection, failed authentication and session management, sensitive data leakage, XML external entity injection (XXE), security error configuration, cross-site scripts (XSS), insecure deserialization, use of components with known vulnerabilities, inadequate logging and monitoring, and API security. The purpose of this list is to help developers, security teams, and IT companies understand and prevent these vulnerabilities to improve the security of Web applications.

    Log in to Reply
  20. Nana Li says

    March 2, 2024 at 8:30 am

    One of the OWASP application security topics I would like to discuss is injection attacks. These attacks occur when untrusted data is inserted into a command or query and sent to an interpreter. By manipulating this data, attackers can deceive the interpreter into executing unauthorized commands or gaining unauthorized access to sensitive information. SQL Injection is a common example of this type of attack, where attackers exploit vulnerabilities to bypass security measures and manipulate database records, leading to breaches of confidentiality, integrity, and availability.

    The risks associated with injection attacks are numerous and severe, including the potential for the deletion of critical system data, unauthorized login as another user, and even full control over the database server. To mitigate these risks and prevent injection attacks, OWASP advises using safe APIs that either eliminate the need for an interpreter entirely or provide a parameterized interface. Implementing these measures can significantly enhance the security of web applications and protect sensitive data from unauthorized access and manipulation.

    Log in to Reply
  21. Yuming He says

    March 2, 2024 at 8:33 am

    OWASP, the Open Web Application Security Project, is a non-profit organization that does not belong to any enterprise or consortium. It provides fair, practical and cost-effective information about computers and Internet applications. Its purpose is to assist individuals, businesses, and institutions in discovering and using trustworthy software.
    The most authoritative aspect of the OWASP project is its “Top 10 Security Vulnerability List”. OWASP Top 10 is not an official document or standard, but rather a widely adopted awareness document used to classify the severity of network security vulnerabilities. Currently, it is evaluated by many vulnerability reward platforms and enterprise security teams for reporting errors. This list summarizes the top ten most likely, common, and dangerous vulnerabilities in web applications, which can help IT companies and development teams standardize application development and testing processes, and improve the security of web products.

    How to start an AppSec Program with the OWASP Top 10
    Stage 1. Identify the gaps and goals of your appsec program
    Stage 2. Plan for a paved road secure development lifecycle
    Stage 3. Implement the paved road with your development teams
    Stage 4. Migrate all upcoming and existing applications to the paved road
    Stage 5. Test that the paved road has mitigated the issues found in the OWASP Top 10
    Stage 6. Build your program into a mature AppSec program

    Log in to Reply
  22. Zhaomeng Wang says

    March 2, 2024 at 1:15 pm

    OWASP (Open Web Application Security Project) Top 10 is a list of the most common web application security risks published by the OWASP organization. The list aims to help developers, testers, and security professionals understand the current top web application security issues and provides recommendations on how to address them.

    The current version of OWASP Top 10 is from 2017 and includes the following 10 most common web application security risks:

    1. Injection: This refers to security vulnerabilities caused by improper filtering, validation, and handling of user inputs, allowing attackers to inject malicious code and perform unauthorized operations.

    2. Broken Authentication: This includes various vulnerabilities resulting from poorly implemented authentication and session management, allowing attackers to bypass authentication, access other users’ accounts, etc.

    3. Sensitive Data Exposure: This refers to the inadequate protection of sensitive data, making it easier for attackers to obtain.

    4. XML External Entities (XXE): This is a security vulnerability caused by incorrect or insecure use of XML parsers, allowing attackers to exploit it to read local files, perform remote requests, etc.

    5. Broken Access Control: This refers to vulnerabilities related to improper access controls, allowing attackers to access unauthorized resources or perform unauthorized actions.

    6. Security Misconfiguration: This refers to vulnerabilities resulting from incorrect configurations of applications or servers, which can be exploited by attackers to gain unauthorized access or perform other malicious operations.

    7. Cross-Site Scripting (XSS): This is a security vulnerability caused by the failure to properly filter user input, allowing attackers to insert malicious scripts into affected applications.

    8. Insecure Deserialization: This refers to security vulnerabilities caused by improper validation and filtering of input during the process of deserialization, allowing attackers to execute arbitrary code or perform remote code execution.

    9. Using Components with Known Vulnerabilities: This includes using third-party components that have known vulnerabilities, which attackers can exploit to infiltrate the system.

    10. Insufficient Logging & Monitoring: This refers to inadequate logging and monitoring practices in an application, making it difficult to detect attacks and respond timely.

    OWASP Top 10 provides the most important web application security issues that developers and security professionals need to focus on during the design, development, and testing of applications. Following the recommendations in the OWASP Top 10 can help mitigate the risk of common attacks and improve the security of web applications.

    Log in to Reply
  23. Haixu Yao says

    March 2, 2024 at 10:36 pm

    OWASP (Open Web Application Security Project) is an online community, open source, non-profit global security organization that provides articles, methodologies, documentation, tools, and technologies in the field of Web application security. OWASP Top 10 lists the recognized most threatening Web application security vulnerabilities, summarizing and updating the top 10 most likely, most common, and most dangerous vulnerabilities in Web applications. Here’s a look at the OWASP Top 10: Injection, Broken Authentication and Session Management, Sensitive Data Exposure), XML External Entity Injection, Broken Access Control, Security Misconfiguration, Cross-Site Scripting and Data Injection, Insecure Deserialization, Using Components with Known Vulnerabilities, Insufficient Logging and Monitoring. To protect against these threats, developers and security teams need to pay close attention to the vulnerabilities listed in OWASP Top 10 and take defensive measures accordingly. This includes implementing secure coding practices, conducting security testing, monitoring and logging, updating and patching known vulnerabilities, and more. At the same time, security policies need to be regularly updated and reviewed to address new threats and vulnerabilities.

    Log in to Reply
  24. Yue Ma says

    March 3, 2024 at 2:37 am

    The OWASP Top 10 is a regularly updated report that Outlines security issues for Web application security, focusing on the 10 most critical risks. The report was put together by a panel of security experts from around the world. OWASP refers to the Top 10 as an “awareness document,” and they recommend that all companies incorporate the report into their processes to minimize and/or protect against security risks. Below are the security risks reported in the OWASP Top 10 2017 report:
    1. Injection
    Injection attacks happen when untrusted data is sent to a code interpreter through a form input or some other data submission to a web application.
    2. Broken Authentication
    Vulnerabilities in authentication (login) systems can give attackers access to user accounts and even the ability to compromise an entire system using an admin account.
    3. Sensitive Data Exposure
    If web applications don’t protect sensitive data such as financial information and passwords, attackers can gain access to that data and sellor utilize it for nefarious purposes.
    4. XML External Entities (XEE)
    This is an attack against a web application that parses XML input.
    5. Broken Access Control
    Access control refers a system that controls access to information or functionality.
    6. Security Misconfiguration
    Security misconfiguration is the most common vulnerability on the list, and is often the result of using default configurations or displaying excessively verbose errors.
    7. Cross-Site Scripting
    Cross-site scripting vulnerabilities occur when web applications allow users to add custom code into a url path or onto a website that will be seen by other users.
    8. Insecure Deserialization
    This threat targets the many web applications which frequently serialize and deserialize data.
    9. Using Components With Known Vulnerabilities
    Many modern web developers use components such as libraries and frameworks in their web applications.
    10. Insufficient Logging And Monitoring
    Many web applications are not taking enough steps to detect data breaches.

    Log in to Reply
  25. Hao Li says

    March 3, 2024 at 8:34 am

    OWASP (Open Web Application Security Project) is an open community, non-profit organization with strong authority to help governments or businesses understand and improve the security of Web applications and Web services. It will provide some security tools also have the main security threats of the day to organize the release, is a security tool applied to web scanning and attacks, and also open source, in blocking proxy and scanning attacks are more powerful.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (1)
  • 0b – The Threat Environment (5)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 2a – Case Study 1 (4)
  • 2b – Cryptography (4)
  • 3a – Secure Networks (5)
  • 3b – Firewalls and IDS and IPS (3)
  • 4b – Case Study 2 (4)
  • 5a – Access Control (5)
  • 5b – Host Hardening (3)
  • 6a – Application Security (4)
  • 6b – Data Protection (2)
  • 7a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in