OWASP 201 – Request-Based Security
Half of the application security risks (ASRs) covered by the OWASP Top Ten list address requests made by visitors or third parties against your web application. Learn what each ASR is, how to identify it in your application, and how to protect against potential abuse.
By the end of this session, you will have seen and learned to defend against:
- Injection (ASR-1)
- Broken Authentication (ASR-2)
- XML External Entities (ASR-4)
- Cross-site Scripting (ASR-7)
- Insecure Deserialization (ASR-8)