Defensive design 2

  • Created by: Tomiwaq
  • Created on: 11-05-19 20:37
View mindmap
  • Defensive design
    • Authentication
      • Authentication can confirm the identity of the user before they're allowed to access data
      • A common way is through using passwords
      • Passwords are usually associated with a username
      • Ways to increase the security of a password based authentication system
        • Force users to use strong passwords and change them regularly
        • Limit the number of failed authentication attempts before access is lost
        • Ask for a random selection of characters from the password on each authentication
      • Too much authentication can affect a program's functionality
    • Should be easy to maintain
      • Programmer should make sure that it is well-maintained
      • Well-maintained programs makes it easy for other programmers to change parts of the source code
      • Features that improve the maintainability of source code
        • Comments are useful for explaining what the key features of a program do
        • Indentation can be used to separate different statements in a program
        • Variables and sub programs should be named so that they refer to what they actually are
        • Only use global variables when necessary as they could affect the rest of your code
      • If a good amount of useful comments are put into the source code then it is very easy to produce a summary of what the program code actually does


No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Designs, testing and IDEs resources »