Web application security threats

Description

The attacks, vectors, emergent threats on websites, web applications and web services, the rankings of their severity identified by dedicated communities such as OWASP (Open Web Application Security Project).

Alternative labels

open web application security project
OWASP

Skill type

knowledge

Skill reusability level

sector-specific

Relationships with occupations

Essential knowledge

Web application security threats is an essential knowledge of the following occupations:

Ethical hacker: Ethical hackers perform security vulnerability assessments and penetration tests in accordance with industry-accepted methods and protocols. They analyse systems for potential vulnerabilities that may result from improper system configuration, hardware or software flaws, or operational weaknesses.
ICT security technician: ICT security technicians propose and implement necessary security updates and measures whenever is required. They advise, support, inform and provide training and security awareness.

Optional knowledge

Web application security threats is optional for these occupations. This means knowing this knowledge may be an asset for career advancement if you are in one of these occupations.

ICT security administrator: ICT security administrators plan and carry out security measures to protect information and data from unauthorised access, deliberate attack, theft and corruption.
ICT security consultant: ICT security consultants advise and implement solutions to control access to data and programs. They promote a safe exchange of information.

Chief ICT security officer: Chief ICT security officers protect company and employee information against unauthorized access. They also define the Information System security policy, manage security deployment across all Information Systems and ensure the provision of information availability.
ICT security manager: ICT security managers propose and implement necessary security updates. They advise, support, inform and provide training and security awareness and take direct action on all or part of a network or system.

Web developer: Web developers develop, implement and document web-accessible software based on the designs provided. They align the client’s web presence with its business strategy, troubleshoot software problems and issues and look for ways to improve the application.

 


 

References

  1. Web application security threats – ESCO

 

Last updated on September 20, 2022