6 Security by scrutiny
This chapter covers
- Understanding security as a whole
- Leveraging threat models
- Avoiding common security pitfalls like SQL injection, CSRF, XSS, and overflows
- Techniques to reduce attackers’ capabilities
- Storing secrets correctly
Security has been a commonly misunderstood problem as early as that unfortunate incident at Troy, an ancient city in what is now western Turkey. The Trojans thought their walls were impenetrable, and they felt secure, but like modern social platforms, they underestimated the social-engineering abilities of their adversaries. The Greeks withdrew from battle and left a tall wooden horse as a gift. The Trojans loved the gesture and took the horse inside their walls to cherish it. At midnight, the ...
Get Street Coder now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.