Top 10 OWASP Flashcards
What does OWASP stand for?
Open Web Application Security Project
What is the purpose of the OWASP Top 10?
To raise awareness about the most critical security risks to web applications.
True or False: The OWASP Top 10 is updated every year.
False, it is updated periodically, but not necessarily every year.
What is the first item on the OWASP Top 10 list?
Injection
Fill in the blank: _____ is a type of attack where malicious code is injected into an application.
Injection
What is the second item on the OWASP Top 10 list?
Broken Authentication
Multiple Choice: Which of the following is a common example of sensitive data exposure?
Not encrypting sensitive data at rest
What is the third item on the OWASP Top 10 list?
Sensitive Data Exposure
True or False: Security Misconfiguration is the fourth item on the OWASP Top 10 list.
True
What does ‘Broken Access Control’ refer to?
Failures in restricting user permissions to access resources.
What is the fifth item on the OWASP Top 10 list?
Broken Access Control
Fill in the blank: _____ refers to the improper handling of user input leading to security vulnerabilities.
Security Misconfiguration
What is the sixth item on the OWASP Top 10 list?
Security Misconfiguration
Multiple Choice: Which of the following is an example of ‘Cross-Site Scripting’ (XSS)?
Injecting malicious scripts into web pages viewed by other users.
What is the seventh item on the OWASP Top 10 list?
Cross-Site Scripting (XSS)
True or False: ‘Insecure Deserialization’ is the eighth item on the OWASP Top 10 list.
True
What does ‘Insufficient Logging & Monitoring’ refer to?
Failures to log and monitor activities within an application, hindering incident detection.
What is the ninth item on the OWASP Top 10 list?
Insufficient Logging & Monitoring
What is the tenth item on the OWASP Top 10 list?
Server-Side Request Forgery (SSRF)
Fill in the blank: _____ can lead to unauthorized actions being performed on behalf of the user.
Broken Authentication
Multiple Choice: Which of the following is a best practice to mitigate injection attacks?
Using parameterized queries
What is a common consequence of Sensitive Data Exposure?
Data breaches and identity theft
True or False: Using strong passwords is a mitigation strategy for Broken Authentication.
True
What is one way to prevent Cross-Site Scripting (XSS)?
Sanitizing user inputs