1. No component is reliable until proven otherwise
2. Delineate difficult-to-circumvent authentication mechanisms
3. Authorize, in addition, to authenticate
4. Separate data from control instructions
5. Validate all data explicitly
6. Use cryptography correctly
7. Identify sensitive data and how they should be managed
8. Always consider the users of the system
9. The integration of components changes the attack surface
10. Consider future changes in objects and actors
from DroidForums.net | Android Forums & News https://ift.tt/2LocspX
via IFTTT
mardi 17 juillet 2018
10 Tips For The Safe Development Of Application
Inscription à :
Publier les commentaires (Atom)
Aucun commentaire:
Enregistrer un commentaire