Checkit certainty software9/11/2023 ![]() Even worse, they may have good intentions but they “spin up core way over its limits” in a nuclear plant while they are cleaning the dashboard in the control room. ![]() Lots of things can happen, even when we talk about software that’s not open to outside your coworker can turn to the “dark side” and try to steal information, or accidentally break things down. If you’re in security, you should always go by the words “ trust no one” and “ defense in depth”. This is not to say that apps not open to outside don’t need security review too. This gives way to hackers to “hack in”, to your system which may lead to loss of important data (payments, passwords, etc.), consequently causing loss of reputation. It is hard to find software that is not open to the world wide web these days. Threat model is an expression used by security experts for security analysis and resolving threats (risks) that emerged in the process. If you want to build good software (and hopefully, you’re aiming to build great software), you must invest time to build in security considerations in the software architecture. ![]() I began writing this post hoping it will help you see all those shades of threats and risks to your code. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |