Exposure-Sensitive-Info-KrishnaG-CEO

2024 CWE Top 25 Most Dangerous Software Weaknesses: Exposure of Sensitive Information to an Unauthorised Actor (CWE-200)

CWE-200 refers to a software flaw where sensitive information—such as personal data, proprietary business details, or system configurations—is unintentionally exposed to individuals or entities without proper authorisation. This weakness typically results from poor implementation of access controls, inadequate data masking, or flawed logic in data-handling processes.

Insufficient-Cryptography-KrishnaG-CEO

OWASP Top 10 for Mobile Apps: M5 – Insufficient Cryptography

Cryptography, at its core, is the practice of securing communication and data through the use of algorithms and keys. For mobile apps, cryptography plays a crucial role in securing sensitive data, ensuring privacy, and maintaining the integrity of user interactions. However, *insufficient cryptography* occurs when an app fails to implement cryptographic algorithms or methods correctly, resulting in data being exposed or vulnerable to unauthorised access.

The issue of insufficient cryptography is particularly critical in mobile applications because of the increasing amount of sensitive information that these apps handle, such as financial data, personal identification information, passwords, and private conversations. Insufficient cryptography in this context means that sensitive data is not encrypted properly, or that weak or deprecated encryption methods are used, leaving the data open to attackers who can intercept, manipulate, or steal it.

Cryptographic-Failures-KrishnaG-CEO

The OWASP Top 10 (2021): Cryptographic Failures

Cryptographic failures occur when sensitive data is not adequately protected during storage, transit, or processing. These failures can arise from the use of outdated encryption algorithms, insecure storage of cryptographic keys, or improper implementation of encryption protocols. The vulnerabilities often stem from either a lack of awareness or neglect of best practices, leaving data exposed to unauthorised access. In the digital age, protecting sensitive data is not optional—it is a business imperative. Cryptographic failures are not merely technical flaws; they carry significant financial, legal, and reputational risks. By adhering to best practices, leveraging modern tools, and staying informed about evolving threats, software developers can safeguard data against adversaries and ensure compliance with stringent regulatory standards.