Difference between revisions of "Top 10 2013-Risk"

From OWASP
Jump to: navigation, search
Line 5: Line 5:
 
     |prev=RN
 
     |prev=RN
 
}}
 
}}
 +
 +
[[File:Top_10_2013-appsec-risks.png|750px|center]]
  
 
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=whole|width=100%|year=2013}}
 
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=whole|width=100%|year=2013}}
What Are Application Security Risks=
+
What Are Application Security Risks
 
</td></tr></table>
 
</td></tr></table>
 
Attackers can potentially use many different paths through your application to do harm to your business or organization. Each of these paths represents a risk that may, or may not, be serious enough to warrant attention.
 
Attackers can potentially use many different paths through your application to do harm to your business or organization. Each of these paths represents a risk that may, or may not, be serious enough to warrant attention.

Revision as of 12:33, 21 February 2013

[[Top 10 {{{year}}}-RN|← RN]]
2013 Table of Contents

2013 Top 10 List

[[Top 10 {{{year}}}-T10|T10 →]]
Top 10 2013-appsec-risks.png
{{{title}}}

What Are Application Security Risks

Attackers can potentially use many different paths through your application to do harm to your business or organization. Each of these paths represents a risk that may, or may not, be serious enough to warrant attention.

</td></tr></table>

[[Top 10 {{{year}}}-RN|← RN]]
2013 Table of Contents

2013 Top 10 List

[[Top 10 {{{year}}}-T10|T10 →]]

© 2002-2013 OWASP Foundation This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license. Some rights reserved. CC-by-sa-3 0-88x31.png
[[Category:OWASP Top Ten {{{year}}} Project]]