Back to Browse

CWE: Categorizing the underlying weakness

1.3K views
Jan 4, 2023
7:03

To better understand, mitigate and avoid vulnerabilities it is useful to look at the underlying weakness. The CWE scheme is a way of categorizing weaknesses that in turn can lead to security vulnerabilities. Such categorization can also help understand the general underlying problem and to understand how to avoid mistakenly inserting such vulnerabilities from the beginning. Still, a categorization is very challenging to make since there will be interactions and overlaps between the categories. In this last part of the course, we will look at how CWE is used to categorize the underlying weaknesses and give an example of this categorization and the complexity that is involved. Dive deeper into the topic on our blog: What is a security weakness? - https://debricked.com/blog/what-is-security-weakness/ Debricked | Your Partner in Open Source https://debricked.com/ Chapters: 0:00 Intro 0:32 The definition of a CWE 1:36 Categories in the Software development view 4:53 Top 25 CWE (2022) 6:17 Course wrap-up Debricked is the small voyager with huge ambitions to not only become the best software composition analysis tool in the universe but to bring SCA 2.0 to the game. Actionability - Debricked SCA doesn't only show you what security vulnerabilities you have, the tool also helps you fix them with either a simple click or a remediation suggestion. Data quality - The Debricked tool is based on state-of-the-art machine learning algorithms, making the data quality absolutely top of the game. This means fewer false positives and minimal false alerts. Open source intelligence - Debricked doesn't only help you analyze and fix vulnerabilities and ensure license compliance, the tool also helps you better understand the health of the open source projects your developers use. Further resources: The Debricked Blog ‣ https://debricked.com/blog/ The Debricked Portal ‣ https://portal.debricked.com/ Open Source Select ‣ https://debricked.com/select/ Vulnerability Database ‣ https://debricked.com/vulnerability-database Connect with us: LinkedIn ‣ https://www.linkedin.com/company/debricked/ Twitter ‣ @debrickedab Instagram ‣ @debricked #Debricked #OpenSource #OpenSourceSecurity

Download

1 formats

Video Formats

360pmp49.2 MB

Right-click 'Download' and select 'Save Link As' if the file opens in a new tab.

CWE: Categorizing the underlying weakness | NatokHD