Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

OWASP Top 10: #1 Broken Access Control and #2 Cryptographic Failures

Description

Learn about broken access control and cryptographic failures, the first two security vulnerabilities listed on the 2021 OWASP Top 10.

Tags

Syllabus

Introduction
  • OWASP Top 10
1. Broken Access Control
  • What is broken access control?
  • Example 1: 2021 Facebook broken access control vulnerability
  • Example 2: 2021 personal data travel breach
  • Prevention techniques: Least privilege
  • Prevention techniques: Record ownership and logging
  • Prevention techniques: Functional access control testing
2. Cryptographic Failure
  • What is cryptographic failure?
  • Example 1: 2021 GoDaddy plaintext passwords
  • Example 2: Using a broken or risky cryptographic algorithm
  • Prevention techniques: Data classification
  • Prevention techniques: Proper key management
  • Prevention techniques: Secure protocols
Conclusion
  • OWASP Top 10 keep learning

Online Course


OWASP Top 10: #1 Broken Access Control and #2 Cryptographic Failures

Affiliate notice

Learn about broken access control and cryptographic failures, the first two security vulnerabilities listed on the 2021 OWASP Top 10.

Introduction
  • OWASP Top 10
1. Broken Access Control
  • What is broken access control?
  • Example 1: 2021 Facebook broken access control vulnerability
  • Example 2: 2021 personal data travel breach
  • Prevention techniques: Least privilege
  • Prevention techniques: Record ownership and logging
  • Prevention techniques: Functional access control testing
2. Cryptographic Failure
  • What is cryptographic failure?
  • Example 1: 2021 GoDaddy plaintext passwords
  • Example 2: Using a broken or risky cryptographic algorithm
  • Prevention techniques: Data classification
  • Prevention techniques: Proper key management
  • Prevention techniques: Secure protocols
Conclusion
  • OWASP Top 10 keep learning