From the course: Threat Modeling: Denial of Service and Elevation of Privilege

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Designing for resilience

Designing for resilience

From the course: Threat Modeling: Denial of Service and Elevation of Privilege

Start my 1-month free trial

Designing for resilience

- [Instructor] Testing for load and testing resilience under a load is a crucial step. Make sure that each component is ready to accept either unexpected load or unexpected disappearance and reappearance of the nodes it talks to. Understand what the load is per count, per action and what variants is reasonable. How many photos, songs, videos, can one account upload? How many messages might they send? Are there ways they can amplify the use of your resources against you or someone else? Chaos monkeys which intentionally break your system seems scary at first but real systems break in strange ways. If yours can't handle some intentional breakage under your control, why do you think it will resist a real attack? Security is always a system property. Some people talk about the weak link but that's still focusing on each link, perhaps ignoring if the chain is properly used and availability even more than most other security…

Contents