cyber securityApplication securityCybersecurity testingOWASP Top Ten – #7 Identification and Authentication Failures