Chapter 8
Security in Application Design
This chapter covers the following topics:
Protecting Privacy: This section covers what constitutes personally identifiable information (PII), data states (in motion or at rest), and how the state affects the security architecture and process. Laws and regulations governing privacy and security are also discussed.
Storing IT Secrets: In this section, you learn about the various types of “secrets” or credentials used to authenticate and authorize any communication or transaction. Passwords are a common example, but others also are described in this section.
Public Key Infrastructure (PKI): This section covers PKI, which is a type of asymmetric cryptography algorithm that requires the generation of two ...
Get Cisco Certified DevNet Professional DEVCOR 350-901 Official Cert Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.