Mile2 Cybersecurity Certifications

Reply To: OCU C)SP D Week 02 Lesson 04 Discussion

#109608
Isabelle Tubbs
Participant

One main OWASP security principle is broken authentication. Authentication can be vulnerable when the design of the authentication is flawed, or it could be that the way it was used or configured was flawed. Whatever the reason may be, authentication in this state allows attackers to use automated tools to eventually hack in. To threaten an entire system, the attacker may need to only get access to a certain number of accounts or to the administrative account.

Once the attacker gets into the system, this actually leads to a second OWASP principle: sensitive data exposure. A hacked system that has valuable information can affect not only the platform but also its users and their information. As a result, taking measures to prevent these types of attacks is important for securing the whole system. Ensuring trusted authentication design and configuration, as well as using strong authentication like multi-factor authentication, can help maintain more security on a system.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.