diff --git a/2025/docs/en/0x02_2025-What_are_Application_Security_Risks.md b/2025/docs/en/0x02_2025-What_are_Application_Security_Risks.md index e38da3d57..c97bdebf2 100644 --- a/2025/docs/en/0x02_2025-What_are_Application_Security_Risks.md +++ b/2025/docs/en/0x02_2025-What_are_Application_Security_Risks.md @@ -3,62 +3,9 @@ Attackers can potentially use many different paths through your application to d  -
| - Threat Agents - | -- Attack \ -Vectors - | -- Exploitability - | -
- Likelihood of Missing Security
- - - Controls - |
-
- Technical
- - - Impacts - |
-
- Business
- - - Impacts - |
-
| - By environment, \ -dynamic by situation picture - | -- By Application exposure (by environment) - | -- Avg Weighted Exploit - | -- Missing Controls \ -by average Incidence rate \ -Weighed by coverage - | -- Avg Weighted Impact - | -- By Business - | -