Difference between revisions of "Competitors"

From OWASP
Jump to: navigation, search
(New page: == Description == Competition is an interaction between individuals from the same species or different species (Human, animal or vegetal) who dispute something. This dispute may be for foo...)
 
Line 1: Line 1:
 
== Description ==
 
== Description ==
Competition is an interaction between individuals from the same species or different species (Human, animal or vegetal) who dispute something. This dispute may be for food, for territory, for light, for employment, for female, for male and so on. Therefore, the competition gives incentives for self improvement, because make you to top expectations to win the competition.
+
Competition is an interaction between individuals from the same species or different species (Human, animal or vegetal) who dispute something. This dispute may be for food, for territory, for light, for employment, for female, for male and so on. So the competition is an incentive for self-improvement, it is necessary to overcome the expectations to win it.
The competition can be destructive, where the individual/group/organism seeks to benefit by damaging/eliminating competing or cooperative
+
The competition can be destructive, when the individual/group/organism seeks to benefit by damaging/eliminating competing or cooperative
  
 
== Risk Factors ==
 
== Risk Factors ==
 
TBD
 
TBD
  
== Examples ==TBD
+
== Examples ==
 +
TBD
  
 
==Related [[Attacks]]==
 
==Related [[Attacks]]==

Revision as of 11:57, 23 June 2008

Description

Competition is an interaction between individuals from the same species or different species (Human, animal or vegetal) who dispute something. This dispute may be for food, for territory, for light, for employment, for female, for male and so on. So the competition is an incentive for self-improvement, it is necessary to overcome the expectations to win it. The competition can be destructive, when the individual/group/organism seeks to benefit by damaging/eliminating competing or cooperative

Risk Factors

TBD

Examples

TBD

Related Attacks

TBD

Related Vulnerabilities

TBD

References

TBD