Summary and resources

Completed

The proliferation of applications across the digital landscape presents an increased opportunity for cybercriminals.

Applications shape how we interact with our friends, and conduct our business. You've seen how a robust software design can improve the confidentiality of the data being accessed via an application. Also, you saw how applications are attacked, creating vectors that cybercriminals can utilize to obtain data about you or your business. Finally, you learned some steps you can take to protect your applications from attack.

Now you've completed this module, you should be able to:

  • Describe what applications are.
  • Describe the threat landscape of applications.
  • Describe common application-based security controls.