index.md minor spelling fixes (#31199)
changed "breches" to "breaches" changed "self-infliced" to "self-inflicted" changed "understadn" to "understand"
This commit is contained in:
@ -19,7 +19,7 @@ The CIA triad is a model used in Information Security to build sound policy. The
|
|||||||
|
|
||||||
Security researchers use a wide variety of methods and tools, which are discussed in this section.
|
Security researchers use a wide variety of methods and tools, which are discussed in this section.
|
||||||
|
|
||||||
Although hacking is a key threat to secure applications, it is not the only one. Application developers need to balance user experience with security features. Some cyber breches are self-infliced due to complex or hard to understadn security configurations. What security features should be set by default? What features should be seemless and which should require explict user consent?
|
Although hacking is a key threat to secure applications, it is not the only one. Application developers need to balance user experience with security features. Some cyber breaches are self-inflicted due to complex or hard to understand security configurations. What security features should be set by default? What features should be seemless and which should require explict user consent?
|
||||||
|
|
||||||
### Website Security Scanners
|
### Website Security Scanners
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user