Question
Which of the following OWASP Top 10 risks involves
insecure coding practices that allow attackers to gain access to sensitive data, such as usernames and passwords?Solution
Sensitive Data Exposure occurs when sensitive information, such as passwords, credit card details, or personal data, is not properly protected during storage or transmission. Weak encryption, improper key management, or lack of HTTPS for data in transit are common causes. An attacker can intercept such data using tools like packet sniffers or by exploiting vulnerabilities in the system. For example, an application storing user passwords in plain text instead of hashing them exposes users to credential theft if the database is compromised. Proper encryption, secure transmission (e.g., HTTPS), and adherence to best practices mitigate this risk. Why Other Options Are Incorrect :
- Security Misconfiguration : Refers to improper settings, like default credentials or unpatched software, not direct data exposure.
- Broken Authentication : Involves flawed authentication mechanisms, leading to unauthorized access, not sensitive data compromise.
- Insecure Deserialization : Involves execution of malicious code via tampered serialized objects, not direct data leaks.
- Insufficient Logging and Monitoring : Refers to the inability to detect and respond to security breaches, not data exposure.
Which of the following is an example of an indirect tax?
Procurement of goods and services from the government portal GeM has crossed ______ so far this fiscal on account of an increase in buying activities by...
What is the full form of UPI in the context of banking in India?
World Customs Organization (WCO) was established in?
Who was the first president of Asian Development Bank (ADB)?
__________Â has partnered with HSBC to advance green hydrogen production aiming to to improve efficiency, cost-effectiveness, and scalability of green ...
Deposit Insurance Corporation (DIC) Bill was introduced in the Parliament on which of the following year?
Which Section of RBI Act, 1934 provides for an empowered six-member monetary policy committee (MPC) to be constituted by the Central Government?
Which of the following is not a initially targeted of Production Linked Incentive Scheme (PLI)?
Which act governs the functioning of insurance companies in India?