You are on page 1of 1

Figure 1 Penetration Testing in a Web Application Environment Thesis by

Susanne Vernersson
2010-10-12 page 20
Pen testing overview

Just because an application holds some security weakness does not necessarily
mean
that the owner of the application will go out of business or lose customers, but
then
again you will never know for sure until you are faced with the scenario.
However,
there are measures that can help a company with assessing the risks involved in
a given
vulnerability scenario. By evaluating the likelihood connected to every threat and
security flaw, it is possible to estimate the impact it will have on a business
system and
thereby determine the overall risk. (OWASP Top Ten 2010, p.5)

You might also like