🌲Jgrove
Search
CTRL + K
🌲Jgrove
Search
CTRL + K
Hobby
Backpacking
Tetons
Running
Notes
Security
Assume Breach
CIA Triad
Content Security Policy Header
Cookie Security
Cross Site Scripting
Defense in Depth
Expect CT Header
Factors of Authentication
Feature-Policy Header
Insider Threats
Least Privilege
Never Trust Always Verify
Public Key Pinning Extension for HTTP
Referrer-Policy
Strict-Transport-Security Header
Supply Chain Attack
Usable Security
Projects
Budgeting App
Password Manager🚧
Reading
Books
Alice and Bob Learn Application Security
A&B Chapter 1 - Security Fundamentals
A&B Chapter 2 - Security Requirements
Alice and Bob Learn Application Security
Home
Factors of Authentication
Something you have
Phone
Computer
Token
Badge for work
Something you are
Fingerprint
Iris Scan
Something physically unique to you
Something you know
Password
Passphrase
pattern