Answer the question
In order to leave comments, you need to log in
What are the disadvantages of the OWASP TOP-10 Threat Model?
Link to the article https://habr.com/ru/company/simplepay/blog/258499/
What are the disadvantages of this model? What was not taken into account in your opinion?
Answer the question
In order to leave comments, you need to log in
God bless people. Does the history of the last couple of three years teach you nothing? You have not yet caught up with the fact that there are bookmarks not only at the software level, but also at the hardware level. And the level of threats has grown to DDoS attacks from which regional providers are on the shoulder blades. And the “correct setup” of the software bundle to ensure the site’s performance ... is nothing more than protection from schoolchildren and knocking the dough out of customers.
The Story of the Elusive Joe
OWASP TOP-10 is not a threat model, but a list of the 10 most common attack vectors for web applications, apparently this is the main drawback.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question