Skip to main content

Security

 

Security

Thus securing a system involves following measures :

                 

1.       Preventing unauthorized access i.e. hiding the information from unauthorisation users.

 

2.       Protection the system from malicious damage or misuse. Such intential misuse can be of the following kinds :

 

·         Theft of information

·         Unauthorized modification of data

·         Unauthorized destruction of data

 

3.       Protection the system against accidental misuse.

 

4.       The term security is often associated with protection with however, there is a difference between them. Protection is defined as guarding the user information against user within the system whereas security is defined as guarding the user information against unauthorized user outside the system




Comments

Popular posts from this blog

Monolithic Architecture

  Monolithic Architecture Monolith means composed all in one piece. The  Monolithic  application describes a single-tiered  software  application in which different components combined into a single program from a single platform. Components can be: Authorization — responsible for authorizing a user Presentation — responsible for handling HTTP requests and responding with either HTML or JSON/XML (for web services APIs). Business logic — the application’s business logic. Database layer — data access objects responsible for accessing the database. Application integration — integration with other services (e.g. via messaging or REST API). Or integration with any other Data sources. Notification module — responsible for sending email notifications whenever needed. Example for Monolithic Approach Consider an example of Ecommerce application, that authorizes customer, takes an order, check products inventory, authorize payment and ships ordered products. This applicat...