From the course: Programming Foundations: Secure Coding

Unlock this course with a free trial

Join today to access over 24,700 courses taught by industry experts.

Introduction to vulnerabilities

Introduction to vulnerabilities

- While we're going to be spending some significant time in this course looking at major classifications of vulnerabilities, I want to talk a bit about vulnerabilities as a whole, and some trends around secure coding. Let's start our conversation with the OWASP Top 10. This may be the single most valuable resource for anyone involved in software development to start their learning journey. The Open Web Application Security Project, or OWASP, publishes a list of the most common classes of security vulnerabilities every three years. Now, their focus is on web applications, but many of the concepts translate to other areas of software development, so there is value here for everyone. That being said, this view of security-related trends is helpful, but also a bit disturbing, because even though this list exists and is well known, the classes of vulnerabilities don't often fall off the list. As an industry, we know that SQL injection attacks are dangerous. We know how to mitigate them…

Contents