Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Arrow up icon
GO TO TOP
Mastering C# and .NET Framework

You're reading from   Mastering C# and .NET Framework .NET Under the hood

Arrow left icon
Product type Paperback
Published in Dec 2016
Publisher Packt
ISBN-13 9781785884375
Length 560 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
Marino Posadas Marino Posadas
Author Profile Icon Marino Posadas
Marino Posadas
Arrow right icon
View More author details
Toc

Table of Contents (21) Chapters Close

Mastering C# and .NET Framework
Credits
About the Author
Acknowledgements
About the Reviewer
www.PacktPub.com
Preface
1. Inside the CLR FREE CHAPTER 2. Core Concepts of C# and .NET 3. Advanced Concepts of C# and .NET 4. Comparing Approaches for Programming 5. Reflection and Dynamic Programming 6. SQL Database Programming 7. NoSQL Database Programming 8. Open Source Programming 9. Architecture 10. Design Patterns 11. Security 12. Performance 13. Advanced Topics Index

The OWASP Top 10


Among the previously mentioned proposals, the so-called OWASP Top 10 is by far the most requested among programmers all over the world.

Its main goal is to help developers identify the most critical security risks facing organizations. To help in the task, they publish a periodical bulletin which has been published since they started in 2010. The current, updated version is the 2013 edition, although they're working on a version for 2017, which is not available at the time of writing this.

The top 10 vulnerabilities are presented in the following graphic. It assumes that the ordering is important, the first one being the most used or dangerous (or both, in many cases):

Also, keep in mind that often, an attack can be a compound of different steps, each step using some of these vulnerabilities (this happens in some of the most sophisticated attacks we know of).

In the diagram, OWASP explains a use case in which an actor gets access to a valuable resource and the elements involved...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime
Visually different images