Heads up! To view this whole video, sign in with your Courses account or enroll in your free 7-day trial. Sign In Enroll
Start a free Courses trial
to watch this video
How do you identify places you might be attacked? Do you have a plan for dealing with an attack and the fallout from such?
Attack vectors
If you want another look at our list of questions, here it is:
- Why would someone want to gain access to your application or data?
- What are the most likely ways someone would gain that access?
- What data would be the most valuable to an attacker?
- Assuming your application is compromised, how would that impact your users? How would it impact your business?
- What processes would you follow to fully recover from an attack?
- How could someone use your application for other illicit uses?
Links
Here is a StackOverflow discussion about why you shouldn't create your own security schemes and cryptography.
If you'd like a bit more info about how cryptography moved from governments to people, this BBC article is a great place to start, as is this article from Wikipedia.
Lastly, the EFF has a great guide to security. While this is mostly aimed at things to do for your own personal online safety, it's full of great ideas and advice. I highly recommend you check it out.
You need to sign up for Treehouse in order to download course files.
Sign up