Skip to main content

Questions tagged [architecture]

0 votes
0 answers
54 views

When writing technical documentation, I want to accurately describe the different parts of an operating system that manage secure communications, such as TLS protocol versions, cipher suites, and ...
Protocol's user avatar
  • 101
0 votes
0 answers
64 views

I have an application that is designed to be installed in a distributed fashion (Firewall | WebApp in DMZ | Firewall | AppServer | DatabaseServer || Security), but which can also run if everything is ...
AnthonyVO's user avatar
  • 101
1 vote
0 answers
96 views

A recurring problem when implementing authorisation checks using procedural code is that you end up duplicating a lot of checks across your codebase and it is easy to forget to apply a check, or ...
Polynomial's user avatar
  • 136k
1 vote
0 answers
114 views

In our organization we have 2 Active Directory DCs which also uses as DNS servers for all our infrastructure (user PCs, domain and non-domain servers, wi-fi clients, vpn users). I have doubts about ...
Aliaksei Kasyan's user avatar
2 votes
1 answer
177 views

Background: My expertise is in machine learning/AI, not cryptography, so I apologize if I'm missing fundamental security concepts. I'm trying to build a privacy-preserving AI agent system and want to ...
BBenyani's user avatar
  • 123
4 votes
4 answers
1k views

I'm trying to figure out the best approach for handling external requests. I am working on a system where the application is currently sitting outside (DMZ) and the DB is inside. The specific port ...
Shahzad's user avatar
  • 43
4 votes
2 answers
328 views

In our organization, we use a GCP setup with Kubernetes. We generate tons of firewall logs as we provide a digital service that generates a high volume of requests from our users. Storing all these ...
seekuhrity's user avatar
0 votes
0 answers
94 views

The InfoSec team of the client I work with has mandated that any customer-facing application's backend should not directly access the database for that application. They require we create another ...
muad'dib's user avatar
0 votes
0 answers
133 views

At my organization we have a lot of servers. We have many common manual maintenance tasks that we'd like to automate. There's currently three approaches we're fighting over internally: Ops engineers ...
Noodle's user avatar
  • 1
1 vote
2 answers
1k views

For example considering that ARM has TrustZone technology, and a potential reduced attack vector because it is based on a simpler RISC (Reduced Instruction Set Computing) based architecture instead of ...
Bob Ortiz's user avatar
  • 7,733
0 votes
1 answer
376 views

Will a random-generated-session-key be enough, so that I can end the usage of csrf token? The front end, will receive the token when logged in. It will be stored in «local storage» at the client’s ...
OrangeSquare's user avatar
1 vote
1 answer
197 views

Let's say I'm building a system, similar to a very simple ecommerce. Users can sign up as consumer and start buying products. Purchases are then stored in the database together with the order status, ...
hubfix's user avatar
  • 23
1 vote
0 answers
194 views

I need to implement a web application consisting of the components FE (Nginx + React.js) BE (Java SpringBoot) DB (MySQL) For simplicity we will assume that the DB runs in localhost on BE's machine. ...
Dan10's user avatar
  • 11
0 votes
0 answers
112 views

As we all know, never trust the client, when they send data to your server. However what if you prevent data manipulation by completely restructuring the architecture to something like the following: ...
mrtechtroid's user avatar
0 votes
1 answer
1k views

We have a situation where we have an architecture that calls for a Web based UI for querying some data and the data input is through rsync over SSH. I think it would be easier to manage and more ...
Osada Lakmal's user avatar

15 30 50 per page
1
2 3 4 5
8