Assessment | Description | Score | |
---|---|---|---|
000 - #Testing 123 Tags: Data |
Lorem ipsum dolor sit amet. Et ducimus earum in veniam eligendi eos expedita ipsa sed accusantium voluptas id rerum atque et dolores aspernatur. | 60 | Select |
DT-000 - Data Theft / Exfiltration Tags: Data; API; Database; Storage; Data in Transit; Data at Rest |
Data theft risk refers to the potential threat of unauthorized access to sensitive information, which can lead to the exposure, misuse, or loss of data. This risk can arise from various sources, including cyberattacks, insider threats, or vulnerabilities in a company's security systems. | 53 | Select |
OWASP - OWASP: API Security 2023 Tags: API; Data; Data in Transit; WAF |
API (Application Programming Interface) risks include potential vulnerabilities such as Distributed Denial of Service (DDoS) attacks, unauthorized access, broken object level permissions, and injection attacks if proper security measures are lacking. This can result in data leakage, with an increased risk if encryption is inadequate. | 20 | Select |
OWASP - OWASP: LLMs 2025 Tags: AI; LLM |
Risk & Mitigations for LLMs and Gen AI Apps outlining vulnerabilities and mitigations for developing and securing generative AI and large language model applications across the development, deployment and management lifecycle. | 79 | Select |
OWASP - OWASP: Mobile Security 2024 Tags: Mobile |
The OWASP Mobile Top 10 is a list of the most critical security risks to mobile applications. It includes improper platform usage, insecure data storage, insecure communication, weak authentication, insufficient cryptography, insecure authorization, poor client code quality, code tampering, reverse engineering, and extraneous functionality. | 25 | Select |
OWASP - OWASP: Web Security 2021 (2025 Coming Soon!!!) Tags: Web |
The OWASP Top Ten is a list of the most critical security risks to web applications, compiled by the Open Web Application Security Project (OWASP). It serves as a guideline for developers and security professionals to help them understand and mitigate the most common and severe vulnerabilities in web applications. | 12 | Select |