One of the functions undertaken by this organization is continual monitoring of attacks leading to the development of a list of top attack methods in use. Which organization is this?
A. OWASP
B. WASC
C. BSI
D. IEEE
B
Explanation: The Web Application Security Consortium (WASC) is an organization that provides best practices for web based applications along with a variety of resources, tools and information that organizations can make use of in developing web applications. One of the functions undertaken by WASC is continual monitoring of attacks leading to the development of a list of top attack methods in use. This list can aid in ensuring that an organization is not only aware of the latest attack methods and how widespread these attacks are but can assist them in making the proper changes to their web applications to mitigate these attack types.
You might also like to view...
Describe the two rules guiding the notation of IPv6.
What will be an ideal response?
LinkedIn is a social networking site that you should visit if you are looking for professional employment.
a. true b. false
Answer the following statements true (T) or false (F)
1. Access control is the central element of computer security. 2. The authentication function determines who is trusted for a given purpose. 3. An auditing function monitors and keeps a record of user accesses to system resources. 4. External devices such as firewalls cannot provide access control services. 5. The principal objectives of computer security are to prevent unauthorized users from gaining access to resources, to prevent legitimate users from accessing resources in an unauthorized manner, and to enable legitimate users to access resources in an authorized manner.
Instruction types can be categorized as: data processing, data storage, control, and ________.
Fill in the blank(s) with the appropriate word(s).