Conclusion

Creating a secure authentication and authorization system is not a routine task. The developer has to find a compromise between a system inconvenient for users but highly secure and a system convenient for users but protected improperly.

When you choose an approach to protection implementation, you should analyze your customer's sphere of activity and estimate the damage of losing information, losing privacy, and breaking into the system.

In any case, follow this rule: Think about security beforehand.



Hacker Web Exploition Uncovered
Hacker Web Exploition Uncovered
ISBN: 1931769494
EAN: N/A
Year: 2005
Pages: 77

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net