Designing secure code
n
Choose techniques to mitigate the Threats –
cont.:
n
Repudiation
n
Digital signatures
n
Timestamps
n
Audit trails
n
Information disclosure
n
Authorization
n
Privacy-enhanced protocols
n
Encryption
n
Protect secrets
n
Don’t store secrets