Conclusion: What Would LeBron Do?
Let's end this chapter with a quick conclusion!
We'll cover the following
What would LeBron do?
It’s time to move on from the HTTP protocol and its features. We’ve been on a long journey, dissecting why cookies were created, how they’re structured, and how you can protect them by applying some restrictions on their Domain
, Expires
, Max-Age
, and Path
attributes, and how other flags such as Secure
, HttpOnly
, and SameSite
are vital in hardening cookies.
Let’s move forward and try to understand what we should do, from a security perspective, when we encounter a particular situation. The next chapter will provide advice based on best practices and past experience.
Let’s take a quiz to test your knowledge of cookies in the next lesson.
Get hands-on with 1400+ tech skills courses.