2021 OWASP Top Ten: Cryptographic Failures

แชร์
ฝัง
  • เผยแพร่เมื่อ 29 มิ.ย. 2024
  • Shifting up one position from the 2017 list to Number 2 is Cryptographic Failures. This was previously known as "Sensitive Data Exposure" which is more of a broad symptom rather than a root cause, and the focus is on failures related to cryptography (or lack thereof). This can often lead to exposure of sensitive data. Notable Common Weakness Enumerations (CWEs) included are CWE-259: Use of Hard-coded Password, CWE-327: Broken or Risky Crypto Algorithm, and CWE-331 Insufficient Entropy. #OWASPTOP10
    Video 3/11
    ⬇️⬇️⬇️ JOIN THE COMMUNITY! ⬇️⬇️⬇️
    DevCentral is an online community of technical peers dedicated to learning, exchanging ideas, and solving problems - together.
    Find all our platform links ⬇️ and follow our Community Evangelists! 👋
    ➡️ DEVCENTRAL: community.f5.com
    ➡️ TH-cam: / devcentral
    ➡️ LINKEDIN: / f5-devcentral
    ➡️ TWITTER: / devcentral
    Your Community Evangelists:
    👋 Jason Rahm: / jrahm | / jasonrahm
    👋 Buu Lam: / buulam | / buulam
    👋 Aubrey King: / aubreyking | / aubreykingf5
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 10

  • @ruthfehilly8640
    @ruthfehilly8640 2 ปีที่แล้ว +6

    Really really good videos. Quick and to the point

    • @devcentral
      @devcentral  2 ปีที่แล้ว

      Thanks Ruth! Glad you enjoyed them and we appreciate the comment!!

  • @EasyPickens999
    @EasyPickens999 ปีที่แล้ว +2

    Hi, first of all many thanks for the videos. In your first example you mention to avoid auto-decryption. Do you mean between the DB and the app? In the case of a user querying CC numbers, you would eventually need to decrypt, would this be done in the app?

  • @covfefe2936
    @covfefe2936 ปีที่แล้ว +2

    Amazing video!! Love this straight forward format easy to remember

    • @devcentral
      @devcentral  ปีที่แล้ว

      Thanks for the comment and glad you enjoyed the video!!

  • @skselim8536
    @skselim8536 ปีที่แล้ว +2

    Awesome 🌟

    • @devcentral
      @devcentral  ปีที่แล้ว

      Glad you liked it and thanks for the comment!

  • @BhargavRajaram
    @BhargavRajaram ปีที่แล้ว +2

    These guys have just narrated what's there on OWASP website.

  • @hammasahmed5592
    @hammasahmed5592 ปีที่แล้ว

    Failure, I was expecting a failure in the algorithm that would lead to data exposure, not a failure in cryptographic setup.
    The good point its the downgrade attack, if it's possible to downgrade a version of cryptos, this would actually be a failure.

  • @seyedmohammadmortezasanaie8346
    @seyedmohammadmortezasanaie8346 ปีที่แล้ว +3

    Your explanation was very bad. This beautiful type of attack could have much better examples 👎