Owasp CWE & CVE Flashcards
What does OWASP stand for?
Open Web Application Security Project.
What is the primary goal of OWASP?
To enable organizations to acquire, develop, and maintain reliable and secure applications.
What is the OWASP Top 10?
A list identifying the ten most critical web application security risks.
Name some resources provided by OWASP.
Application security tools, standards, books, presentations, videos, cheat sheets, security controls, libraries, local chapters, research, conferences, and mailing lists.
What is the purpose of the OWASP Top 10?
To identify the most severe web application security risks for a wide range of organizations.
What does CWE stand for?
Common Weakness Enumeration.
What is CWE?
A formal list of common software weaknesses that can lead to exploitable vulnerabilities in software architecture, design, code, or implementation.
What are the primary goals of CWE?
To serve as a common language for describing software security weaknesses, as a standard measure for security tools, and as a basis for weakness identification, mitigation, and prevention.
What does CVE stand for?
Common Vulnerabilities and Exposures.
What is CVE?
A list of publicly known cybersecurity vulnerabilities, each with an identification number, description, and at least one public reference.
How are CVE data used?
In numerous cybersecurity products and services worldwide, including the U.S. National Vulnerability Database (NVD).
What is the main difference between CWE and CVE?
CWE lists software weaknesses that can lead to vulnerabilities, while CVE lists specific vulnerabilities that hackers can use to gain access to systems or networks.
Why is CWE important for software security?
It provides a common framework for describing, measuring, and addressing software security weaknesses.
How does CVE contribute to cybersecurity?
By providing a standardized identification for known vulnerabilities, facilitating their tracking and mitigation.
Migitation
mitigation involves implementing strategies and practices to minimize the impact of security vulnerabilities or to prevent these vulnerabilities from being exploited.