diff --git a/guide/english/security/index.md b/guide/english/security/index.md index 760a7a0f5a..73528c49d4 100644 --- a/guide/english/security/index.md +++ b/guide/english/security/index.md @@ -19,7 +19,7 @@ The CIA triad is a model used in Information Security to build sound policy. The Security researchers use a wide variety of methods and tools, which are discussed in this section. -Although hacking is a key threat to secure applications, it is not the only one. Application developers need to balance user experience with security features. Some cyber breches are self-infliced due to complex or hard to understadn security configurations. What security features should be set by default? What features should be seemless and which should require explict user consent? +Although hacking is a key threat to secure applications, it is not the only one. Application developers need to balance user experience with security features. Some cyber breaches are self-inflicted due to complex or hard to understand security configurations. What security features should be set by default? What features should be seemless and which should require explict user consent? ### Website Security Scanners