Skip main navigation

Hurry, only 4 days left to get one year of Unlimited learning for £249.99 £174.99. New subscribers only. T&Cs apply

Find out more

Threat Analysis Cont.

This video explains why injection threats are dangerous and what you need to consider when trying to find the source of an attack.

In the last video, you learned about injection flaws, and you now understand that every data source is a potential attack target. This video explains why injection threats are dangerous and what you need to consider when trying to find the source of an attack.

You will learn more about how a system can be damaged through injection threats. When you think about why your system is attacked, you need to consider the value of the data that was compromised – who would it be valuable to, and why? These concepts will be discussed in greater detail.

Investigate and share: Go to OWASP Injection Threats and read the details about injection threats. If there is anything that is unclear, share your questions here, and try to respond to other users’ questions.

This article is from the free online

Advanced Cyber Security Training: OWASP Top 10 and Web Application Fundamentals

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now