What are the most frequent threat mitigation suggestions?

Asked on 27.09.2018 in All Questions.
Add Comment

Tutor's Answer

(Top Tutor) Studyfaq Tutor
Threat#1 Logging should be used to record source, time and summary of sent data to and from users to be used to check if the correct data has been sent to the user.   Threat#2 An authentication mechanism should be used for the user to identify the external entity (API) such as two-factor authentication using SMS.   Threat#3 Consider the impact and potential mitigations for your custom authentication scheme. SSL certificates could be used to...
Completed Work