官术网_书友最值得收藏!

Summary

In this chapter, learned the basic and most commonly used terminologies while discussing software security. You know the difference between threat, vulnerability, and risk, and understand how each one is related to the other. You also learned about the different kinds of threats and vulnerabilities that can affect a system. You now know how to properly approach coding your security system thanks to the secure code principles. Finally, you learned about the different methods of testing that you should consider in order to make your application robust. Properly understanding these definitions allows you to design better security systems for your software.

So as a developer, you have to address the security of your application, but what does Android do for you? Android has several built-in security measures that reduce the frequency and the potential damage that application security issues may cause. In the next chapter, you will learn about these features and understand how they work.

主站蜘蛛池模板: 巢湖市| 卢龙县| 柘城县| 冷水江市| 新余市| 喀喇| 鄂尔多斯市| 呼玛县| 密云县| 嘉黎县| 当涂县| 安顺市| 汾阳市| 项城市| 宜川县| 饶河县| 吉木乃县| 东明县| 石门县| 平凉市| 安图县| 克山县| 尼勒克县| 冀州市| 南京市| 夏津县| 河源市| 新泰市| 措勤县| 左贡县| 长宁县| 民勤县| 沧州市| 普洱| 苏尼特右旗| 石狮市| 巢湖市| 武穴市| 晋江市| 亚东县| 宁强县|