Skip to content

Commit 85a7104

Browse files
committed
review-2
1 parent 121d06c commit 85a7104

19 files changed

+58
-61
lines changed

learn-pr/aspnetcore/owasp-top-10-for-dotnet-developers/1-introduction.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Introduction
44
metadata:
55
title: Introduction
66
description: "Overview of OWASP Top 10 in 2021 for .NET Developers. What is OWASP Top 10?"
7-
ms.date: 05/31/2024
7+
ms.date: 06/18/2025
88
author: obrocki
99
ms.author: dawidobrocki
1010
ms.topic: unit

learn-pr/aspnetcore/owasp-top-10-for-dotnet-developers/10-software-data-integrity-failures​.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Software and data integrity failures
44
metadata:
55
title: Software and data integrity failures
66
description: "OWASP Top 10 for .NET Developers. Software and data integrity failures."
7-
ms.date: 05/31/2024
7+
ms.date: 06/18/2025
88
author: obrocki
99
ms.author: dawidobrocki
1010
ms.topic: unit
@@ -20,13 +20,13 @@ quiz:
2020
choices:
2121
- content: "Static application security testing (SAST)."
2222
isCorrect: false
23-
explanation: "Static analysis focuses on code prior to its deployment."
23+
explanation: "Static analysis focuses on code before its deployment."
2424
- content: "Software Composition Analysis (SCA)."
2525
isCorrect: false
26-
explanation: "Composition analysis focuses on code prior to its deployment."
26+
explanation: "Composition analysis focuses on code before its deployment."
2727
- content: "Dynamic Application Security Testing (DAST)."
2828
isCorrect: true
2929
explanation: "Correct. Dynamic analysis can inspect and report on infrastructure configuration and expose its weak points."
3030
- content: "Chaos testing."
3131
isCorrect: false
32-
explanation: "This is a helpful technique in reliability and disaster recovery testing, but not quite right for this situation."
32+
explanation: "Chaos testing is a helpful technique in reliability and disaster recovery testing, but not the best choice for this situation."

learn-pr/aspnetcore/owasp-top-10-for-dotnet-developers/11-security-logging-monitoring​.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Security logging and monitoring
44
metadata:
55
title: Security logging and monitoring
66
description: "OWASP Top 10 for .NET Developers. Security logging and monitoring."
7-
ms.date: 05/31/2024
7+
ms.date: 06/18/2025
88
author: obrocki
99
ms.author: dawidobrocki
1010
ms.topic: unit
@@ -15,12 +15,12 @@ content: |
1515
quiz:
1616
title: Check your knowledge
1717
questions:
18-
- content: "Which of these statements would you consider secure logging best practices?"
18+
- content: "Which of these statements would you consider to be secure logging best practices?"
1919
choices:
2020
- content: "Log all events occurring in the system and store the logs in an easily accessible public location."
2121
isCorrect: false
2222
explanation: "Overlogging can add noise when diagnosing issues. Logs should be protected and not exposed to the public."
23-
- content: "Log user and password of all failed authentication attempts."
23+
- content: "Log the user and password of all failed authentication attempts."
2424
isCorrect: false
2525
explanation: "Not quite. Failed authentication attempts should be logged and audited. Logging passwords is a security risk."
2626
- content: "Sanitize logs from sensitive information and guard access to logged information."

learn-pr/aspnetcore/owasp-top-10-for-dotnet-developers/12-server-side-request-forgery.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Server-side request forgery
44
metadata:
55
title: Server-side request forgery
66
description: "OWASP Top 10 for .NET Developers. Server-side request forgery."
7-
ms.date: 05/31/2024
7+
ms.date: 06/18/2025
88
author: obrocki
99
ms.author: dawidobrocki
1010
ms.topic: unit
@@ -16,7 +16,7 @@ content: |
1616
quiz:
1717
title: Check your knowledge
1818
questions:
19-
- content: "Is performing input validation on the client side only considered to be best practice?"
19+
- content: "Is it considered to be best practice to perform input validation on the client side only?"
2020
choices:
2121
- content: "Yes."
2222
isCorrect: false

learn-pr/aspnetcore/owasp-top-10-for-dotnet-developers/13-summary.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Summary
44
metadata:
55
title: Summary
66
description: "OWASP Top 10 for .NET Developers. Summary of what OWASP Top 10 means to .NET developers."
7-
ms.date: 05/31/2024
7+
ms.date: 06/18/2025
88
author: obrocki
99
ms.author: dawidobrocki
1010
ms.topic: unit

learn-pr/aspnetcore/owasp-top-10-for-dotnet-developers/2-what-is-owasp-top-10.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: What is OWASP Top 10?
44
metadata:
55
title: What is OWASP Top 10?
66
description: "Overview of OWASP Top 10 in 2021 for .NET Developers. What is OWASP Top 10?"
7-
ms.date: 05/31/2024
7+
ms.date: 06/18/2025
88
author: obrocki
99
ms.author: dawidobrocki
1010
ms.topic: unit

learn-pr/aspnetcore/owasp-top-10-for-dotnet-developers/3-broken-access-control.yml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Broken access control
44
metadata:
55
title: Broken access control
66
description: "OWASP Top 10 for .NET Developers. Broken Access Control."
7-
ms.date: 05/31/2024
7+
ms.date: 06/18/2025
88
author: obrocki
99
ms.author: dawidobrocki
1010
ms.topic: unit
@@ -30,7 +30,6 @@ quiz:
3030
- content: "Be the only go-to report your organization would need to stay secured."
3131
isCorrect: false
3232
explanation: "Incorrect. There are many security reports beyond OWASP, with SANS CWE Top 25 being one of them."
33-
3433
- content: "What is Broken Access Control?"
3534
choices:
3635
- content: "A vulnerability that allows an attacker to access restricted information."

learn-pr/aspnetcore/owasp-top-10-for-dotnet-developers/4-cryptographic-failures.yml

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Cryptographic failures
44
metadata:
55
title: Cryptographic failures
66
description: "OWASP Top 10 for .NET Developers. Cryptographic failures."
7-
ms.date: 05/31/2024
7+
ms.date: 06/18/2025
88
author: obrocki
99
ms.author: dawidobrocki
1010
ms.topic: unit
@@ -23,9 +23,7 @@ quiz:
2323
explanation: "Incorrect. Rely on industry-standard encryption and hashing implementations. Review the documentation to ensure you're using strong algorithms."
2424
- content: "No."
2525
isCorrect: true
26-
explanation: "Correct. Rely on industry-standard encryption and hashing implementations. Review the documentation to ensure you're using strong algorithms."
27-
28-
26+
explanation: "Correct. Rely on industry-standard encryption and hashing implementations. Review the documentation to ensure you're using strong algorithms."
2927
- content: "The process of converting data to a different format for storage, transmission, compression, or decompression best describes:"
3028
choices:
3129
- content: "Encryption."

learn-pr/aspnetcore/owasp-top-10-for-dotnet-developers/5-injection.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Injection
44
metadata:
55
title: Injection
66
description: "OWASP Top 10 for .NET Developers. Injection."
7-
ms.date: 05/31/2024
7+
ms.date: 06/18/2025
88
author: obrocki
99
ms.author: dawidobrocki
1010
ms.topic: unit

learn-pr/aspnetcore/owasp-top-10-for-dotnet-developers/6-insecure-design.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Insecure design
44
metadata:
55
title: Insecure design
66
description: "OWASP Top 10 for .NET Developers. Insecure design."
7-
ms.date: 05/31/2024
7+
ms.date: 06/18/2025
88
author: obrocki
99
ms.author: dawidobrocki
1010
ms.topic: unit

0 commit comments

Comments
 (0)