Cyber Security: What are the OWASP top 10?

Explained over a beer at the pub! Because well… who doesn't like talking software engineering over a nice cold beverage!

Patty C
The Delectable Developer

--

Photo by Sigmund on Unsplash

Imagine we’re having a chat at the pub, sipping on some cold ones, Maybe a nice smoked lager or a big bock? I heard you were looking at swapping careers into cyber security? Well a good place to start is with the OWASP top 10!

We’ll be going over the old 2017 OWASP top 10 here, since they were the ones I learnt in uni, but most of them are still relevant and hopefully this gets you interested enough to learn about the latest 2021 reiteration!

Injection

It’s like tricking the computer into doing something it shouldn’t. It’s a bit like sliding a secret note into your order at the pub to get extra fries without paying. You need a way to “inject” this unauthorised order, in reality this most often looks like typing SQL or JS into name or comment fields in application forms.

See the cautionary tale of little Bobby tables from the XKCD archives.

Exploits of a mum — XKCD (https://xkcd.com/327/)

--

--

Patty C
The Delectable Developer

Data Architect, Software Engineer, Data Scientist, moonlighting Bio-informatician.