R
R
rinarigel2019-05-14 23:38:42
Information Security
rinarigel, 2019-05-14 23:38:42

What are the disadvantages of the OWASP TOP-10 Threat Model?

Link to the article https://habr.com/ru/company/simplepay/blog/258499/
What are the disadvantages of this model? What was not taken into account in your opinion?

Answer the question

In order to leave comments, you need to log in

2 answer(s)
S
Sergey, 2019-05-15
@edinorog

God bless people. Does the history of the last couple of three years teach you nothing? You have not yet caught up with the fact that there are bookmarks not only at the software level, but also at the hardware level. And the level of threats has grown to DDoS attacks from which regional providers are on the shoulder blades. And the “correct setup” of the software bundle to ensure the site’s performance ... is nothing more than protection from schoolchildren and knocking the dough out of customers.
The Story of the Elusive Joe

V
Vladimir Dubrovin, 2019-05-15
@z3apa3a

OWASP TOP-10 is not a threat model, but a list of the 10 most common attack vectors for web applications, apparently this is the main drawback.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question