Application security:
It ensures the security of an application by taking some measures to protect the application from external threats. it is the use of software, hardware, and procedural methods to protect applications from external threats. security is becoming an increasingly important concern during the development as the application become more frequently accessible over the network and as result they become vulnerable to a wide verity of threats
Application security includes the following things
1. knowing your threats
2. securing the network host and network
3.encorporating security in the software development process
Issues of application security.
the important issues of application security include the following.1.verification of users:
an application needs to verify that only legitimate user or trying to use them. the identification of legitimate users by identifying their IP address2. granting access to the user:
once a user is authenticated the application needs to determine if the identified user allowed to access the functionality requested by him. this is called authorization.3. keeping the data confidential with encryption:
for business, transaction data from application system get exchange over the network. data stored by the application system need to be transmitted in encrypted form to prevent it from the potential attack.4. Guaranteeing Data Integrity
when the receivers get a message neither the sender nor the receiver can refuse it. That is the denial of authentication of the message. A digital signature is a common mechanism to guarantee data integrity.
5. Safeguarding application form common attack strategies
6. Guarding the privacy of the application
Types of application security
1. email security
Threats to email.
1. Junk file
Junk file is a very common term, that describes any orphaned file or it has no real value. Junk files are commonly referred among technologists ghost files or fantom files.
2. spam
Email spamming is an act of sending unsolicited bulk eMails, which one has not asked for. These are from commercial companies as an advertisement.
3. virus
Some emails may incorporate with files containing malicious scripts which may run on your computer and may lead to destroy or leak your important data.
4. Fishing
Email fishing is an activity of sending email to a user claiming to be a legitimate user of any enterprise. Its main purpose is to steal sensitive information such as password, username, etc.
Such e-mail contact with such websites Which are infected with viruses and ask for entering the details. This website looks like a legitimate enterprise.
there are few steps to clean up and archive your inbox.
stapes:
5. Cleanup and archiving email
in order to have lightweight inbox its good to archive your inbox from time to time.there are few steps to clean up and archive your inbox.
stapes:
- select the file tab on the mail banner.
- select cleanup tools button on the account information screen.
- select archive from cleanup tool dropdown menu.
- select archive this folder and all subfolder options and then click on the folder you want to archive.
- select the date from the archive items older than
- click browse to 'create new.pst' file name and location. and click 'ok'
2. database security
databases are a cardinal component of any web-based application that enables websites to provide varying dynamic content. databases to are usually intended to be shared across the deferent application thus the database security is primarily concern with the secrecy of data. it ranges from protection from intentional unauthorized database user to unintentional database accesses by unauthorized entities
the general categories of secrecy related problems in database management systems are:
- improper release of information from reading data that were intentionally accessed by an unauthorized user.
- the improper modification of data.
- denial of services(DOS) threats
threats to database security
- data tempering
- data theft
- password related threats
- falsification of user identification
- unauthorized access to tables and columns
- unauthorized access to data rows lack accountability
3. internet security
it contains IPSec(Internet Security Protocol) and SSL(Secure Socket Layer)
Internet security refers to securing communication over the internet it encompasses browser security, data security, net security and overall authentication and protection of data sent via internet protocol
1.IPSec(Internet Security Protocol)
2. SSL(Secure Socket Layer)
it consists of a set of a protocol designed by IETF(Internet Engineering Task Force) it provides security at the network level and helps to create authenticated and confidential packets for IP layer
it is a security protocol developed by net scape communication corporation. it provides security at the transport layer and includes the important security issues like confidentiality integrity and authenticity
it includes specific security protocol such as
data backup refers to copying data into an archiving file. it may be used to restore the original content after a data loss event.
1.IPSec(Internet Security Protocol)
2. SSL(Secure Socket Layer)
1.IPSec(Internet Security Protocol)
it consists of a set of a protocol designed by IETF(Internet Engineering Task Force) it provides security at the network level and helps to create authenticated and confidential packets for IP layer
2. SSL(Secure Socket Layer)
it is a security protocol developed by net scape communication corporation. it provides security at the transport layer and includes the important security issues like confidentiality integrity and authenticity
Threats to internet security
it includes specific security protocol such as
- worms
- malware
- ransomware
- spam
- fishing
- spoofing
Backup
data backup refers to copying data into an archiving file. it may be used to restore the original content after a data loss event.
- data backups have two main purpose the primary purpose is to recover the data after it's lost. (either by data deletion or corruption )
- the secondary purpose of data backups is to recover the data from an earlier time
good..👍👍
ReplyDeleteYour blog provided us with valuable information to work with. Each & every tips of your post are awesome. Thanks a lot for sharing. Keep blogging
ReplyDeleteBest Corporate Training Provider in Noida
Industrial Training in Linux
Best Dot Net Programming
Online Certification and courses in Java
nice post
ReplyDeleteaws training in bangalore
Amazon web services training in bangalore
best AWS Training institute in Bangalore
aws training institutes in bangalore
aws certification course in bangalore
devops training in bangalore
devops training institutes in bangalore
devops certification course in bangalore
satta king are usually offered by the computer brands on their own websites, play bazaar so take a look before you buy a new computer.
ReplyDeleteGreat;
ReplyDeleteYou can get all Latest Technology Informational Blogs. So you can read and share with family and friends.
You can get all Latest Technology Informational Blogs. So you can read and share with family and friends.
ReplyDelete