Designing secure code
nChoose techniques to mitigate the Threats – cont.:
nDenial of service
nAuthentication
nAuthorization
nFiltering
nThrottling – limiting the number of requests to the system
nQuality of service – i.e. prioritising the traffic
nElevation of privilege
nRun with least privilege