This section features software threats, attacks, vulnerabilities and countermeasures.
Visual Threats and Countermeasures
Threats – Attacks – Vulnerabilities – Countermeasures
Input and Data Validation – Authentication – Authorization – Auditing and Logging – Client Side Validation – Communications Security – Configuration Management – Cryptography – Exception Management – Sensitive Data – Session Management
Range – Type – Memory – Cryptography and Secrets – Authentication, Authorization and Trust – Input Validation – Logic Errors – Misuse of Language Features – Synchronization and Timing
Attack Patterns – Vulnerability Patterns – Security Design Patterns – Security Implementation Patterns