• symmetric and asymmetric crypto-systems • the TLS protocol • network and host-based threat, vulnerabilities, attacks
and counter-measures 15-437 Web Application Development • the HTTP protocol • how to deploy your web application over HTTPS • web-based threats, vulnerabilities, attacks and counter-measures