Skip to main content

Considerations

We are acting as designers, developers and systems administrators.  By hosting a service – whether it is on the open internet, available to a select few, or only for your personal use – we must make sure we consider how well approach this software and it's hosting.

We will approach these 

 

 

Data privacy

Documentation 


Bandwidth

Internet and hardware (hard drive)


Scaling

Adding more users bandwidth resources and hardware


Encryption

Https enceyption and disk encryption

Security vs convenience


Resources

Power and internet


Updates & Upgrades

Hardware and software



    What is your attack surface, i.e. is it your local machine? a LAN? your entire home? data over the Internet? A worldwide enterprise? That determines how much you have to do

    What is the value of the data? Does a hacker care about Joe Schmo? Probably not. But do you have confidential company data, or are you an important stakeholder? Well, now you've suddenly become a bigger target

    How much time, money and effort are you willing to put into your security? Remember, there are entire companies dedicated to security, and entire SOC's whose sole job is monitoring for security incidents and even they don't catch everything. These organizations have multiple experts, layers of defense and constant monitoring, but the data they protect is worth it (see #2 above). How much effot you're willing to put in determines how many steps you need to take.