Technical requirements
This chapter will require that you have an appreciation for common security vulnerabilities such as the potential to spoof the system, tamper with workloads, exploit backdoor network connections, the ability to reverse-engineer software to exploit weaknesses in the code, timeliness of attack responses, and so on. We will also be leveraging the Open Horizon hzn
commands you learned in the Developing an Open Horizon service section of Chapter 9.