Difference between revisions of "Category:OWASP Honeycomb Project"

From OWASP
Redirect page
Jump to: navigation, search
(Redirecting to Category:OWASP ASDR Project)
 
(6 intermediate revisions by 3 users not shown)
Line 1: Line 1:
 +
#REDIRECT [[:Category:OWASP ASDR Project]]
 
==Overview==
 
==Overview==
  
Line 9: Line 10:
 
==Organization==
 
==Organization==
  
Application security information cannot be organized into a one-dimensional taxonomy. We've adopted the [http://en.wikipedia.org/wiki/Folksonomy folksonomy] tagging approach to solving this problem. We simply tag our articles with a number of different categories. You can use these category to help get different views into the complex, interconnected set of topics that is application security.
+
Application security information cannot be organized into a one-dimensional taxonomy. We've adopted the [http://en.wikipedia.org/wiki/Folksonomy folksonomy] tagging approach to solving this problem. We simply tag our articles with a number of different categories. You can use these categories to help get different views into the complex, interconnected set of topics that is application security.
  
 
The tagging scheme does have a simple hierarchy, though. The top level categories are:
 
The tagging scheme does have a simple hierarchy, though. The top level categories are:
  
 
* [[:Category:Principle|Principles]]
 
* [[:Category:Principle|Principles]]
* [[:Category:Threat|Threats]]
+
* [[:Category:Threat_Agent|Threat Agents]]
 
* [[:Category:Vulnerability|Vulnerabilities]]
 
* [[:Category:Vulnerability|Vulnerabilities]]
 
* [[:Category:Attack|Attacks]]
 
* [[:Category:Attack|Attacks]]
* [[:Category:Countermeasure|Countermeasures]].
+
* [[:Category:Countermeasure|Countermeasures]]
 +
* [[:Category:Category:Technical_impact|Technical Impacts]]
 +
* [[:Category:Category:Business_impact|Business Impacts]]
  
 
Each of these categories may have subcategories. For example, there is a general [[:Category:Vulnerability|Vulnerability]] category for all articles describing a vulnerability. There are also tags for more specific types of vulnerabilities, such as those listed below:
 
Each of these categories may have subcategories. For example, there is a general [[:Category:Vulnerability|Vulnerability]] category for all articles describing a vulnerability. There are also tags for more specific types of vulnerabilities, such as those listed below:
Line 75: Line 78:
 
'''The difficulties in organizing this information'''
 
'''The difficulties in organizing this information'''
  
Most efforts to organization application security information attempt to force the information into a one-dimensional taxonomy of one sort or another. These efforts (including the [[OWASP Top Ten]]) have failed to adequately make the information useful. By attempting to simplify application security into a one-dimensional taxonomy makes the information useless for many critical tasks.
+
Most efforts to organization application security information attempt to force the information into a one-dimensional taxonomy of one sort or another. These efforts (including the [[OWASP Top Ten]]) have failed to adequately make the information useful. Attempting to simplify application security into a one-dimensional taxonomy makes the information useless for many critical tasks.
  
 
'''The approach we’ve taken'''
 
'''The approach we’ve taken'''
Line 127: Line 130:
 
'''Note: the portal only lists categories that start with the letters of the first 200 articles. To view other categories, select the "next 200" button.'''
 
'''Note: the portal only lists categories that start with the letters of the first 200 articles. To view other categories, select the "next 200" button.'''
  
 +
== ==
  
 
 
 
 
 
== ==
 
  
 
__NOTOC__
 
__NOTOC__

Latest revision as of 17:57, 8 May 2009

Subcategories

This category has the following 8 subcategories, out of 8 total.

C

C cont.

T

V