Becoming familiar with what can compromise a computer security watch is becoming a daunting task. But here from The State of Security site is some possible help – an enumeration of the top 25 most common weaknesses, dubbed a Common Weakness Enumeration (CWE).
“The CWE Top 25 is a community-developed list of the most dangerous common software and hardware weaknesses that are often easy to find, exploit, and can allow adversaries to completely take over a system, steal data, or prevent an application from working.”
The post includes a number of stipulations and qualifications, but overall, looks pretty helpful.
“The CWE Top 25 provides security professionals, developers, and users a more meticulous view of common and impactful weaknesses. The main goal of CWE is, ‘to stop vulnerabilities at the source by educating software and hardware, architects, designers, programmers, and acquires on how to eliminate the most common mistakes before software and hardware are delivered.’ Keeping up-to-date with weaknesses that are seeing a higher frequency and becoming more impactful to hardware and software will help prevent security vulnerabilities and mitigate risk for enterprises and organizations.”