Skip to content

Commit af1ce1e

Browse files
Reword availability quiz for clarity. Fixes #162
Signed-off-by: David A. Wheeler <[email protected]>
1 parent 3a01184 commit af1ce1e

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

secure_software_development_fundamentals.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -391,15 +391,15 @@ untrusted user might be an attacker.
391391

392392
#### Quiz 1.2: Security Requirements
393393

394-
\>\>A typical requirement for an Internet-connected service is to stay available regardless of the attacks it undergoes. True or False?<<
394+
\>\>A typical Internet-connected commercial service should try to stay available, but this may be difficult to achieve if the service is the target of a highly-resourced distributed denial-of-service attack (DDoS) by a criminal organization or nation-state. True or False?<<
395395

396-
( ) True
396+
(x) True
397397

398-
(x) False
398+
( ) False
399399

400400
[Explanation]
401401

402-
This is false. It would be great if we could ensure that all Internet-connected services could always stay available. But in most cases, if every device in the world connected to the Internet requested a specific service, that service will be unable to handle the load. At some point, attackers with many resources can usually overwhelm the availability of a defender with few resources.
402+
This is true. It would be great if we could guarantee that all Internet-connected services could always stay available. But in most cases, if every device in the world connected to the Internet requested a specific service, that service will be unable to handle the load. At some point, attackers with many resources can usually overwhelm the availability of a defender with few resources.
403403

404404
Of course, we should not make it easy for an attacker to take down a system. So instead, any Internet-connected services we build should be able to handle some moderate request rate so that an attacker has to at least commit nontrivial resources. You could do this by designing the system so that it can rapidly scale to large request sizes, and using other services like content delivery networks (CDNs) to harden the system against large loads. In addition, a service can use techniques like rapid recovery so that even if it is taken down by an attack, it can quickly recover when the attack ends.
405405

0 commit comments

Comments
 (0)