Wednesday, May 8, 2019

The security properties of network applications Assignment

The security properties of vane applications - Assignment prototypeThat is confidentiality, integrity and availability of data to the right person. Not only will this report cover the engagement applications security, but it will also look into the network applications architecture and how this architecture discharge be go around implemented so as to ensure data confidentiality, data integrity and data availability. For this case study, BF is a affable network application that aids individuals to have a social forum with other people. by means of that, an interested individual will have to show with BF so that they bottom of the inning be in a position to communicate with other individuals through the use of text and sending of images and videos. 1.2 Application description What be network applications? These be programs that run on a network and they allow for more than one user to have access to the program. Network applications can either be run online or offline. Off line network applications can be related to programs such as Office. These programs can be installed and/ or networked from the main horde so that they can allow more that one individual to have access to using the program. When it comes to online network applications, these are applications that need an online emcee and a client both of which must communicate in real conviction else they will no longer be referred to as online network applications. In this case, there is a master of ceremonies which is located in the data centre. The server stores all the relevant data and information that may be queried by a client. The client on most occasions could be a web browser or another computer/ laptop/ or gadget. How does BF work? What is the user experience of BF? Based on the above application description, the same ideology can be applied to our case that is the BF social network application program. It is important to note that BF also uses the same application description where there exists a server and a client. The servers (s) are always located in the data centre. This is to ensure that they are not accessed by individuals who are not authorised to come into contact with them. In addition to that, the client in this instance will be the web browser that the user will use so as to let on in the Universal Resource Locator (URL) of BF. Example http //www.BF.com Once the user hits the search button from their web browser, that will send a request for the search of the URL (http //www.BF.com) and the cor sufficeing BF server will respond to the request by providing that particular web page that the user searched for. After that, the user will register/ sign up with BF by providing their personal details such as their email talk, physical address and real names. Assumptions made about BF Based on the BF social network application program, some of the assumptions that can be made include Communication concurrency Due to the fact that BF is an online social network application, information is prostrate to be exchanged betwixt the server and the client. With that, communication concurrency should be adhered to strictly. An assumption is that the lack of communication concurrency between the server and the client will lead to data loss. Stability Stability is critical to a social network application program. Lack of stability can cause huge losses due to downtime of the program. This is majorly caused when the servers cannot bring off users overwhelming requests. Data security There is exchange of data between the server and the client. Therefore, data security should be critically analysed. An assumption is

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.