💻
Software Development
Ctrlk
  • Everything anyone should know
    • Fundamental
    • Advanced
    • Comparison
  • Design Pattern
    • Overview
    • Creational Design Patterns
    • Structural Design Patterns
    • Behavior Design Patterns
    • Use cases
    • More
    • Some design patterns contradictory
  • Architect
    • Clean Architecture
    • Layered (n-tier) Architecture
    • Microservices Architecture
    • Monolithic Architecture
    • Service-Oriented Architecture (SOA)
    • Domain-Driven Design (DDD)
    • Blackboard Architecture
    • Object-Oriented Architecture
  • Microservices Design Pattern
    • Saga Pattern
    • Strangler Fig Pattern
    • API Gateway Pattern
    • Backends For Frontends (BFF) Pattern
    • Service Discovery Pattern
    • Circuit Breaker Pattern
    • Bulk Head Pattern
    • Retry Pattern
    • Sidecar Pattern
    • Event Driven Architecture Pattern
    • CQRS (Command and Query Responsibility Segregation)
    • Configuration Externalization Pattern
  • Design and development principles
    • SOLID aka Design Principles
    • Cohesion Principles
    • Coupling principle
    • Some fundamental principles
  • Authentication and Authorization Standards
    • SAML
    • OAuth
    • OIDC
    • SCIM
    • SSO
    • Tools
    • More
  • .NET TECHNOLOGY
    • .NET MVC
    • Fundamental
    • Advanced
    • Tutorial Coding
    • ServiceStack
    • POCO
  • System Design
    • Blueprint
    • Fundamental
    • Use cases
  • DBMS
    • Fundamental
    • Advanced
    • Comparation
  • Javascript
    • ES6 Techniques
    • Basic
    • 5 ways to define a function
  • Clean code
    • Page 2
  • Search Engine
    • Elastic Search
    • Solr
    • IBM Watson Discovery
    • Google Cloud Search
    • Coveo Relevance Cloud
  • Cloud Service
    • Overview
    • Azure
    • AWS
    • GCP
    • OCI
    • Object Storage Server
    • Comparison
  • Front End
    • Basic
    • Modern Framework
    • Compile & Module
    • TypeScript
    • Blazor
    • UI Library
    • Security
    • Some notices
  • Microservices
    • Service Mesh
    • Service Registry
    • Service Discovery
    • Composition
    • Orchestration
    • Transformation
    • Dapr
  • Network
    • Protocols
    • OSI Model
  • Cache
    • Redis
    • Hazelcast
    • Memcached
  • Message Broker
    • RabbitMQ
    • Kafka
    • ActiveMQ
    • Masstransit
  • Bash Script
    • Linux file system
    • Cheat sheet
    • 18 Most-used Linux Commands
    • Interview Question
  • Devops
    • Overview
    • Azure Pipeline
    • Docker
    • Kubernetes
    • Openshift
    • IaC
    • Jenkin
    • GitOps
    • Monitoring
  • Web Server
    • Apache
    • Nginx
    • IIS
  • Security
    • How to prevent crawl data
    • SQL Injection
    • OWASP
      • Web Application Security Risks
        • Broken Access Control
        • Cryptographic Failures
        • Injection
        • Insecure Design
        • Security Misconfiguration
        • Vulnerable and Outdated Components
        • Identification and Authentication Failures
        • Software and Data Integrity Failures
        • Security Logging and Monitoring Failures
        • Server-Side Request Forgery
      • API Security Risks
    • Security headers
  • Data Change Capture (CDC)
    • Debezium
  • Software Development Life Cycle (SDLF)
    • Waterfall
    • V Model
    • Agile
  • Secure Software Development Framework (SSDF)
    • Page 1
  • Source Control
    • Git
    • SVN
    • TFS
  • Integration Systems
    • Stripe
    • Salesforce
    • TaxJar
    • Zendesk
  • Enterprise Service Bus (ESB)
    • Mulesoft
  • Data
    • 5 type of analytics
  • SOFTWARE QUALITY STANDARDS – ISO 5055
    • Standard
    • All about ISO 5055
  • Interview Question
    • Overview
    • Technical
    • Behavior
    • Question back to the interviewer
  • Roadmap
    • .NET
    • Java
  • English
    • Phát âm ed
    • Many vs much
    • Most vs most of vs almost vs the most
    • Quy tắc thêm s,es vào danh từ và cách phát âm s,es chuẩn xác nhất
  • Those will be seen later
    • Note
    • Interview
  • Programming Language
    • Python
    • Javascript
    • C#
    • Java
Powered by GitBook
On this page
  1. Security
  2. OWASP

Web Application Security Risks

Broken Access ControlCryptographic FailuresInjectionInsecure DesignSecurity MisconfigurationVulnerable and Outdated ComponentsIdentification and Authentication FailuresSoftware and Data Integrity FailuresSecurity Logging and Monitoring FailuresServer-Side Request Forgery
PreviousOWASPNextBroken Access Control