-
Notifications
You must be signed in to change notification settings - Fork 0
Security Issues
Caroline Barrineau edited this page Oct 31, 2022
·
5 revisions
Identify sensitive information kept by your software. Explain how you plan to protect it. Sensitive information would be the user’s emails and passwords.
Identify possible attack vectors, that is, ways malicious users could try to use your software to escalate their privileges. This includes root access to your server, access to other user's sensitive information (say via XSS attacks), root access to your database, etc. User’s emails could be
Explain protection plan. Login security