Designing secure code
nChoose techniques to mitigate the Threats – cont.:
nRepudiation
nDigital signatures
nTimestamps
nAudit trails
nInformation disclosure
nAuthorization
nPrivacy-enhanced protocols
nEncryption
nProtect secrets
nDon’t store secrets