Question
Which of the following OWASP Top 10 risks involves
insecure coding practices that allow attackers to gain access to sensitive data, such as usernames and passwords?Solution
Sensitive Data Exposure occurs when sensitive information, such as passwords, credit card details, or personal data, is not properly protected during storage or transmission. Weak encryption, improper key management, or lack of HTTPS for data in transit are common causes. An attacker can intercept such data using tools like packet sniffers or by exploiting vulnerabilities in the system. For example, an application storing user passwords in plain text instead of hashing them exposes users to credential theft if the database is compromised. Proper encryption, secure transmission (e.g., HTTPS), and adherence to best practices mitigate this risk. Why Other Options Are Incorrect :
- Security Misconfiguration : Refers to improper settings, like default credentials or unpatched software, not direct data exposure.
- Broken Authentication : Involves flawed authentication mechanisms, leading to unauthorized access, not sensitive data compromise.
- Insecure Deserialization : Involves execution of malicious code via tampered serialized objects, not direct data leaks.
- Insufficient Logging and Monitoring : Refers to the inability to detect and respond to security breaches, not data exposure.
What is perplexity in language models?
Which of the following sorting technique is an example of Divide and Conquer technique?
Which of the following best describes the function of cache memory in a computer system?Â
In the context of IPv4 vs. IPv6, which of the following statements is true regarding address space?Â
Which IPv6 feature can unintentionally expose internal network structure to attackers if not properly randomized?
Consider three processes P1, P2, and P3 with burst times 10, 5, and 8 respectively. All arrive at time 0. Using the Shortest Job First (SJF) non-preempt...
Which of the following best describes the relationship between Distributed Parallel Computing and Cloud Computing?Â
Bourne-style shells uses which below symbol
What is the range of the header of a TCP segment in bytes?
Which probability distribution is most widely used to model channel noise in pulse code modulation?