Heads up! To view this whole video, sign in with your Courses account or enroll in your free 7-day trial. Sign In Enroll
Start a free Courses trial
to watch this video
How do you identify places you might be attacked? Do you have a plan for dealing with an attack and the fallout from such?
Attack vectors
If you want another look at our list of questions, here it is:
- Why would someone want to gain access to your application or data?
- What are the most likely ways someone would gain that access?
- What data would be the most valuable to an attacker?
- Assuming your application is compromised, how would that impact your users? How would it impact your business?
- What processes would you follow to fully recover from an attack?
- How could someone use your application for other illicit uses?
Links
Here is a StackOverflow discussion about why you shouldn't create your own security schemes and cryptography.
If you'd like a bit more info about how cryptography moved from governments to people, this BBC article is a great place to start, as is this article from Wikipedia.
Lastly, the EFF has a great guide to security. While this is mostly aimed at things to do for your own personal online safety, it's full of great ideas and advice. I highly recommend you check it out.
Related Discussions
Have questions about this video? Start a discussion with the community and Treehouse staff.
Sign upRelated Discussions
Have questions about this video? Start a discussion with the community and Treehouse staff.
Sign up
You need to sign up for Treehouse in order to download course files.
Sign upYou need to sign up for Treehouse in order to set up Workspace
Sign up