Documente Academic
Documente Profesional
Documente Cultură
The OWASP
http://www.owasp.org/
Foundation
Introduction
Crown Jewels
Money
Data
Notoriety
What it Represents
Making a Statement
Users + Focus
Complex Systems
Multiples
Technologies
Developers
Servers
Applications
Highly volatile
Something to lose
Time to Impact
Coordination
Number of Cooks
External Visibility
Cascading
Highest volume
Visibility
Outward - Press
Outward - Voters
Inward - Staff
Large volume of data
Real time responses
Debate timeline changes
Rapid Switch
Rules Reset
Configure Rather than Recode
Assume Nothing
Contingency Plan
Branding
Integrated Tools
Integrated Sites
Feeds
Applications are wide ranging
Perception and reality must meet
Constant Attacks
High Volume Pages
Concentrated Volume
Sub-Pages - Understanding how the
application functions
Coordinated Attacks
Guide
Top 10
Specific Tools
Put Back In
Take the Advantage
The OWASP
http://www.owasp.org/
Foundation