From 5f2d8abc24ccd6b87df4161d12e40ae03e30783f Mon Sep 17 00:00:00 2001 From: jballi17 <32826136+jballi17@users.noreply.github.com> Date: Thu, 7 Mar 2019 21:12:43 -0600 Subject: [PATCH] index.md minor spelling fixes (#31199) changed "breches" to "breaches" changed "self-infliced" to "self-inflicted" changed "understadn" to "understand" --- guide/english/security/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/guide/english/security/index.md b/guide/english/security/index.md index 760a7a0f5a8..73528c49d4a 100644 --- a/guide/english/security/index.md +++ b/guide/english/security/index.md @@ -19,7 +19,7 @@ The CIA triad is a model used in Information Security to build sound policy. The Security researchers use a wide variety of methods and tools, which are discussed in this section. -Although hacking is a key threat to secure applications, it is not the only one. Application developers need to balance user experience with security features. Some cyber breches are self-infliced due to complex or hard to understadn security configurations. What security features should be set by default? What features should be seemless and which should require explict user consent? +Although hacking is a key threat to secure applications, it is not the only one. Application developers need to balance user experience with security features. Some cyber breaches are self-inflicted due to complex or hard to understand security configurations. What security features should be set by default? What features should be seemless and which should require explict user consent? ### Website Security Scanners