Complete the code to name the OWASP Top 10 category that involves unauthorized access to data.
The OWASP Top 10 category for unauthorized data access is [1].
Broken Access Control means attackers can access data or functions they shouldn't. It's about unauthorized access.
Complete the code to identify the OWASP Top 10 risk related to inserting malicious code into queries.
The OWASP Top 10 risk involving malicious code in queries is called [1].
Injection attacks happen when untrusted data is sent to an interpreter as part of a command or query, allowing attackers to execute malicious code.
Fix the error in naming the OWASP Top 10 risk that involves flaws in session management.
The OWASP Top 10 risk related to session and credential management is [1].
Broken Authentication refers to weaknesses in authentication and session management, allowing attackers to compromise passwords or session tokens.
Fill both blanks to complete the description of an OWASP Top 10 risk involving improper setup and missing security headers.
The risk called [1] occurs when [2] are not properly configured, leading to vulnerabilities.
Security Misconfiguration happens when security settings are missing or incorrect, exposing the system to attacks.
Fill all three blanks to complete the dictionary comprehension that maps OWASP Top 10 risks to their descriptions.
owasp_risks = [1]: '[2]', [3]: 'Allows attackers to inject malicious code'}}
This dictionary maps 'Broken Access Control' to its name and 'Injection' to its description about malicious code injection.