Skip to content

Security Issues

Caroline Barrineau edited this page Oct 27, 2022 · 5 revisions

Sensitive Information

Identify sensitive information kept by your software. Explain how you plan to protect it.

Possible Malicious Attacks

Identify possible attack vectors, that is, ways malicious users could try to use your software to escalate their privileges. This includes root access to your server, access to other user's sensitive information (say via XSS attacks), root access to your database, etc.

Protection Plan

Explain protection plan. Login security

Clone this wiki locally