Question
Which of the following OWASP Top 10 risks involves
insecure coding practices that allow attackers to gain access to sensitive data, such as usernames and passwords?Solution
Sensitive Data Exposure occurs when sensitive information, such as passwords, credit card details, or personal data, is not properly protected during storage or transmission. Weak encryption, improper key management, or lack of HTTPS for data in transit are common causes. An attacker can intercept such data using tools like packet sniffers or by exploiting vulnerabilities in the system. For example, an application storing user passwords in plain text instead of hashing them exposes users to credential theft if the database is compromised. Proper encryption, secure transmission (e.g., HTTPS), and adherence to best practices mitigate this risk. Why Other Options Are Incorrect :
- Security Misconfiguration : Refers to improper settings, like default credentials or unpatched software, not direct data exposure.
- Broken Authentication : Involves flawed authentication mechanisms, leading to unauthorized access, not sensitive data compromise.
- Insecure Deserialization : Involves execution of malicious code via tampered serialized objects, not direct data leaks.
- Insufficient Logging and Monitoring : Refers to the inability to detect and respond to security breaches, not data exposure.
Under what condition is an order issued by a District Commission, State Commission, or National Commission considered final?
Who is responsible for authenticating all orders, decisions, and instruments issued by the Board of Approval?
What is the minimum number of partners required to form a partnership under the Partnership Act?
In which case it was held that the “goods on a display are an invitation, not an offer?
What can a person do if they are aggrieved by an order made under section 3 of the the Occupational Safety, Health and Working Conditions Code?
Which of the following is an exception to the doctrine of privity of contract rule _______________?
Provisions as to the Administration of Tribal Areas as to Assam, Meghalaya, Tripura and Mizoram is in which schedule of the Constitution of India?
Under the Act, LIC shall carry on:Â
Consider the following statements regarding criminal intimidation under Section 503 of the Bharatiya Nyaya Sanhita, 2023:
Statement 1: Crimina...
Within how many days is a Public Information Officer (PIO) required to respond to an RTI application under the RTI Act, 2005?