That’s actually a subject that is difficult to answer quickly. You have to defend against multiple types of attack, and no defense will be perfect against a smart, well resourced attacker. Some of the attack vectors that must be attended to: physical, cryptographic, electrical, electromagnetic radiation, light. And probably a few more that I’m not thinking about right now. Some of the attacks you have to worry about depend on the application and implementation.
Latest Answers