OWASP TOP 10 – PART A

In the previous post, we discussed what security is,  the methodologies applied to attack applications, and who determines the requirements and laws that we must abide by.  In this post,…