ByteByteGo Logo

Security

Security is a critical aspect of system design. It is essential to protect the system from unauthorized access, data breaches, and other security threats. In this set of guides, we will explore some of the key security concepts and best practices that you should consider when designing a system.

JWTSecurity

Explaining JSON Web Token (JWT) to a 10 Year Old Kid

Explaining JSON Web Token (JWT) in simple terms for kids.

Updated 3/15/2024
AuthenticationAuthorization

Session, Cookie, JWT, Token, SSO, and OAuth 2.0 Explained

Understanding sessions, cookies, JWT, SSO, and OAuth 2.0 in one diagram.

Updated 3/14/2024
HTTPSEncryption

How does HTTPS work?

Learn how HTTPS encrypts data for secure communication over the internet.

Updated 3/13/2024
authenticationSSO

What is SSO (Single Sign-On)?

Learn about Single Sign-On (SSO) and how it simplifies user authentication.

Updated 3/12/2024
Network SecurityCybersecurity

Top Network Security Cheatsheet

A concise guide to network security threats across OSI layers.

Updated 3/11/2024
OAuth 2.0Authorization

OAuth 2.0 Flows

Explore OAuth 2.0 flows: Authorization Code, Client Credentials, and more.

Updated 3/10/2024
Web SecurityCookies

What is a Cookie?

Learn about cookies, how they work, and their role in web browsing.

Updated 3/9/2024
VPNSecurity

Types of VPNs

Explore different VPN types and their use cases for secure connections.

Updated 3/8/2024
2FAAuthentication

How Google Authenticator Works

Explore the mechanics of Google Authenticator and 2-factor authentication.

Updated 3/7/2024
VPNSecurity

How Does a VPN Work?

Explore how VPNs create secure connections for online privacy.

Updated 3/6/2024
SSHSecurity

How does SSH work?

Explore the inner workings of SSH, a secure network protocol.

Updated 3/5/2024
AuthenticationSecurity

Cookies vs Sessions vs JWT vs PASETO

Explore cookies, sessions, JWT, and PASETO for modern authentication.

Updated 3/4/2024
CybersecurityFundamentals

Cybersecurity 101

A concise overview of cybersecurity fundamentals and key concepts.

Updated 3/3/2024
HTTPSSecurity

Is HTTPS Safe?

Explore HTTPS security, vulnerabilities, and how tools capture packets.

Updated 3/2/2024
authenticationjwt

JWT 101: Key to Stateless Authentication

Learn about JSON Web Tokens (JWT) for secure, stateless authentication.

Updated 3/1/2024
AuthenticationJWT

Session-based Authentication vs. JWT

Understand the key differences between session and JWT authentication.

Updated 2/28/2024
EncryptionCryptography

Symmetric vs Asymmetric Encryption

Explore symmetric vs asymmetric encryption: methods, security, and use cases.

Updated 2/27/2024
HTTPSEncryption

HTTPS, SSL Handshake, and Data Encryption Explained

Learn about HTTPS, SSL handshake, and data encryption in simple terms.

Updated 2/26/2024
data securitydata management

How do we manage sensitive data in a system?

A cheat sheet for managing sensitive data in a system.

Updated 2/25/2024
CryptographySecurity

How Digital Signatures Work

Learn how digital signatures work to secure electronic documents.

Updated 2/24/2024
AuthenticationSecurity

Top 4 Authentication Mechanisms

Explore the top 4 authentication mechanisms for secure access.

Updated 2/23/2024
Network SecurityFirewall

Top 6 Firewall Use Cases

Explore the top 6 firewall use cases for enhanced network security.

Updated 2/22/2024
security designsystem design

How to Design a Secure System

A cheat sheet for designing secure systems with key design points.

Updated 2/21/2024
AuthenticationAuthorization

Sessions, Tokens, JWT, SSO, and OAuth Explained

Understanding sessions, tokens, JWT, SSO, and OAuth concepts.

Updated 2/20/2024
AuthenticationAuthorization

Token, Cookie, Session

Understanding tokens, cookies, and sessions for user identity management.

Updated 2/19/2024
HTTPWeb Development

HTTP Cookies Explained With a Simple Diagram

Understand HTTP cookies with a simple diagram and clear explanations.

Updated 2/18/2024
cookiessessions

Cookies vs Sessions

Explore the key differences between cookies and sessions in web development.

Updated 2/17/2024
Network SecurityFirewall

Firewall Explained to Kids and Adults

Learn about firewalls: network security, types, and how they protect us.

Updated 2/16/2024
AuthenticationPasskeys

Is PassKey Shaping a Passwordless Future?

Exploring PassKey's potential to revolutionize online security.

Updated 2/15/2024
securitypasswords

How Password Managers Work

Learn how password managers like 1Password and LastPass keep passwords safe.

Updated 2/14/2024
access controlrbac

Designing a Permission System

Explore common permission system designs: ACL, DAC, MAC, ABAC, and RBAC.

Updated 2/13/2024
password securitydata protection

Storing Passwords Safely: A Comprehensive Guide

Learn how to securely store and validate passwords in your database.

Updated 2/12/2024
Data SecurityData Handling

Encoding vs Encryption vs Tokenization

Understand encoding, encryption, and tokenization for data handling.

Updated 2/11/2024
DevOpsSecurity

What is DevSecOps?

Explore DevSecOps: integrating security into the DevOps lifecycle.

Updated 2/10/2024