官术网_书友最值得收藏!

Summary

In this chapter, learned the basic and most commonly used terminologies while discussing software security. You know the difference between threat, vulnerability, and risk, and understand how each one is related to the other. You also learned about the different kinds of threats and vulnerabilities that can affect a system. You now know how to properly approach coding your security system thanks to the secure code principles. Finally, you learned about the different methods of testing that you should consider in order to make your application robust. Properly understanding these definitions allows you to design better security systems for your software.

So as a developer, you have to address the security of your application, but what does Android do for you? Android has several built-in security measures that reduce the frequency and the potential damage that application security issues may cause. In the next chapter, you will learn about these features and understand how they work.

主站蜘蛛池模板: 华亭县| 揭阳市| 玛纳斯县| 澄城县| 三原县| 景洪市| 高邑县| 广安市| 濮阳市| 原平市| 察雅县| 武胜县| 镇宁| 昭平县| 吉水县| 满城县| 富顺县| 凉城县| 兴文县| 交口县| 花垣县| 繁峙县| 聂拉木县| 彩票| 怀宁县| 理塘县| 类乌齐县| 屯门区| 古浪县| 霍山县| 无为县| 金坛市| 祁门县| 通化市| 嵊州市| 鹿邑县| 陆丰市| 呼伦贝尔市| 大足县| 青州市| 新干县|