Skip to content

Commit 2827fa5

Browse files
authored
Merge pull request #83 from cocoa-xu/cx-fix-spell
fix spell issues
2 parents b09ad7e + 1984766 commit 2827fa5

File tree

4 files changed

+6
-6
lines changed

4 files changed

+6
-6
lines changed

modules/11-authentication.livemd

+1-1
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ Bypassing MFA
135135
JWT token vulnerabilities
136136

137137
Authentication Issues, Weaknesses, Failures make an appearance on multiple lists
138-
OWASP Top 10 for Web Applications A07:2021-Identification and Authentication Failurs (used to be called Broken Authenticication
138+
OWASP Top 10 for Web Applications A07:2021-Identification and Authentication Failures (used to be called Broken Authenticication
139139

140140
## Prevention and Countermeasures
141141
Use built and tested authentication mechanisms in your code language framework.

modules/12-cryptography.livemd

+3-3
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ Data classification, regulatory implications that must be protected from unautho
6363
Confidentiality
6464
6565
For in-transit
66-
use HTTPS which implements encrpytion over a channel. Diffie-Hellman
66+
use HTTPS which implements encryption over a channel. Diffie-Hellman
6767
[Serving over HTTPS
6868
](https://hexdocs.pm/plug/https.html)
6969
@@ -87,12 +87,12 @@ Cryptographic Failures are the number two most common issue on the OWASP Top 10
8787
Related weaknesses include CWE-327: Broken or Risky Crypto Algorithm, and CWE-331 Insufficient Entropy.
8888

8989
Most of the concerns around cytography amount to data being inadvertently being sent in cleartext, sensitive data, the use of old, weak or custom cryptographic algorithms or protocols that are ineffective against attacker efforts to uncover keys, . Best practics is to never build your own crypto mechanisms. Use proven and secure methods like the following:
90-
-Secure Hashes: SHA-1 has been deprecated as of 2011 with a transition plan released in 2022. Recommenation to move towards orther families SHA256
90+
-Secure Hashes: SHA-1 has been deprecated as of 2011 with a transition plan released in 2022. Recommendation to move towards orther families SHA256
9191
-Secure Encryption Algorithms; AES is the current standard; secure modes must be emplemented
9292

9393
Follow NIST Recommendations for configuring the most secure algorithms when building your applications and securing secrets and data.
9494

95-
Beware of hardcoding keys, private keys, in source code where they can be discovered by malicious actors. Avoid building your own crytographic mechanisms or using outdated protocols.
95+
Beware of hardcoding keys, private keys, in source code where they can be discovered by malicious actors. Avoid building your own cryptographic mechanisms or using outdated protocols.
9696

9797
[Recommended algorithms
9898
](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-77r1.pdf)[

modules/4-graphql.livemd

+1-1
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Excessive Data Exposure is number 3 on OWASP's API Security Top 2019 and APIs wi
3535

3636
### Prevention
3737

38-
The less an attacker can learn about your system or application, the more difficult (though, of course, not impossible given time and resources) it will be to identify vulnerablilities and craft exploits that could result in a successful compromise.
38+
The less an attacker can learn about your system or application, the more difficult (though, of course, not impossible given time and resources) it will be to identify vulnerabilities and craft exploits that could result in a successful compromise.
3939

4040
Taking every opportunity to add a layer of difficulty (see defense in depth section in Module 3) for malicious actors is one aspect of securing data and applications.
4141

modules/8-cicd.livemd

+1-1
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ This module will cover over some of the automated processes you may see in a CI/
3232
Built in Elixir, for Elixir, by NCC Group - this tool will try to determine whether your codebase has a number of web vulnerabilities as well as the insecurites outlined in [Module 5 - Elixir Security](./5-elixir.livemd).
3333

3434
### <span style="color:blue;">Example</span>
35-
Install [Sobelow](https://sobelow.io/) and add it to your application dependicies or install it by following the instructions https://hexdocs.pm/sobelow/readme.html
35+
Install [Sobelow](https://sobelow.io/) and add it to your application dependencies or install it by following the instructions https://hexdocs.pm/sobelow/readme.html
3636

3737
Scan your project by running the following at a terminal in your project's root directory
3838
```

0 commit comments

Comments
 (0)