Week 3

 Give your interpretation and opinion of how important algorithms are regarding encryption and protection of data. 

reference:  https://www.youtube.com/watch?v=-413tlhPDZo 




D. Since we know that this particular instance of the AppMaker implements a customer-facing store that processes financial transactions, how does that influence which threat agents may be interested in attacking it?



As the target architecture, who are the threat agents who will be most interested in attacking Web applications created through AppMaker?