ICST.Table 1: Difference between revisions
Programsam (talk | contribs) No edit summary |
Programsam (talk | contribs) No edit summary |
||
| Line 60: | Line 60: | ||
| '''H8.''' In WordPress, more of the lines of code that were changed due to security issues were hotspots. | | '''H8.''' In WordPress, more of the lines of code that were changed due to security issues were hotspots. | ||
| colspan=2 | True (Chi-Square, p<0.00001) | | colspan=2 | True (Chi-Square, p<0.00001) | ||
|- | |||
| style="border-style: solid; border-width: 0 1px 1px 0" | *This finding is consistent with the report from SANS (see Section 1) that indicates that the most popular types of web application attacks are input validation vulnerabilities. | |||
† Please note that we use the term "hypothesis" in this table with respect to scientific hypotheses and not statistical hypotheses. | |||
|} | |} | ||