Common Threats & Risks
Threat
A threat is any potential source of harm or adverse event that may exploit a vulnerability in a system or an organization's security measures. Threats can originate from malicious actors, system flaws, or operational weaknesses.
Risk
Risk is the potential for loss or harm resulting from a threat exploiting a vulnerability in a system or organization. It considers both the likelihood of the event occurring and its impact if it does.
A threat represents a possible danger, while risk measures the probability and impact of that threat materializing. A threat alone does not always pose a significant risk, as security controls can reduce its likelihood and impact.
Common Web Application Threats
The impact and severity of each threat depend on the web application and its security measures. Below are some prevalent threats:
Cross-Site Scripting (XSS) β Injecting malicious scripts into web applications to execute in usersβ browsers.
SQL Injection (SQLi) β Exploiting database queries to gain unauthorized access or manipulate data.
Cross-Site Request Forgery (CSRF) β Forcing a user to perform unintended actions without their consent.
Security Misconfigurations β Weak default settings or improperly configured security controls.
Sensitive Data Exposure β Poor encryption or handling of confidential information.
Brute-Force and Credential Stuffing Attacks β Repeated login attempts using stolen or guessed credentials.
File Upload Vulnerabilities β Allowing malicious file uploads leading to code execution or data leaks.
Denial-of-Service (DoS) or Distributed DoS (DDoS) β Overloading a system to make it unavailable.
Server-Side Request Forgery (SSRF) β Exploiting a server to make unauthorized internal requests.
Inadequate Access Controls β Weak authentication or authorization mechanisms.
Using Components with Known Vulnerabilities β Running outdated libraries, frameworks, or plugins.
Broken Access Control β Improper enforcement of user permissions, allowing unauthorized actions.
This is not an exhaustive list. Other threats exist, and new vulnerabilities continue to emerge. Effective security practices help mitigate these risks.
Last updated