of attacks. We distinguish between scalable attacks, where costs are almost independent of the number of users attacked, and non-scalable (or targeted) attacks, which involve per-user effort.”
is to be expected if any defence is neglected. This leads to the following puzzling fact: the idea that worst-case outcomes become actual is not supported by evidence.”
Alice fails to address the scalable attacks that reach everyone. After this, Alice’s strategy depends on which, if any, of her assets are valuable enough and visible enough to place her in the top few percent of available targets.”
References Misconfiguration Sensitive Data Exposure Function Level Controls Cross Site Request Forgery Known Vulnerabilities Unvalidated Redirects https://www.owasp.org/
References Misconfiguration Sensitive Data Exposure Function Level Controls Cross Site Request Forgery Known Vulnerabilities Unvalidated Redirects 0% 10% 20% 30%