Total security is not achievable but it is not necessary. Focus on the weakest links and design security to your needs.
- I love Hollywood heist films. … Heat and Oceans Eleven are two of my favorites. … Most heist films start with something of great value … which has been protected by what everyone … is sure is impenetrable security. … The defenders have taken every precaution they can imagine … but there's always an angle that they've not considered, … a failure point that has escaped their notice. … The film's plot develops surprising … schemes to get past their defenses. … As audience members, we delight in watching … the exploit of that unexpected, improbable, … sometimes high risk way to get inside. … The most famous example has got to be from … Mission: Impossible when Tom Cruise is suspended … from the ceiling as he hacks into … a computer in an ultra secure room. … Like heist films, nothing can ever be 100% secure. … There are always ways to gain access that we don't expect. … Even if we were able to perfectly secure a system … against all known bugs and vulnerabilities, … that system is not fixed in time. …
- Threat models
- Least privilege
- Defense in depth
- Validating and sanitizing input
- Credential attacks
- SQL injection
- Cross-site scripting
Skill Level Beginner
Web Programming Foundationswith Morten Rand-Hendriksen58m 44s Beginner
Web Security: Same-Origin Policieswith Sasha Vodnik1h 54m Advanced
1. Security Overview
2. General Security Principles
3. Filter Input, Control Output
4. The Most Common Attacks
Next steps2m 26s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.