Please enable JavaScript.
Coggle requires JavaScript to display documents.
IA3 - Coggle Diagram
IA3
Considerations
-
-
-
-
Client needs
Jane
Wants to do alot of things focusing on science, music and teenage activities. Wants way to find activities to do with family
Sienna
Likes to spend time with large groups of peaple and wants away to find fitness related events like marathons.
-
-
Code
Server side
Data
Databases
Opendata Brisbane: Live Events Dataset www.data.brisbane.qld.gov.au/data/dataset/brisbane-city-council-events
-
XML
Benefits
-
-
-
-
Compatible to all systems, due to being endorsed as a standard
Negatives
-
XML namespaces are problematic to use and namespace support can be difficult to correctly implement in an XML parser
-
Higher costs due to higher storage, data transmission and processing needs
-
-
Security
Strategies
CIA triad
-
Integrity
Integrity involves maintaining the consistency, accuracy and trustworthiness of data over its entire lifecycle.
Availability
Availability means information should be consistently and readily accessible for authorized parties.
Data Security
Encryption (OWASP Cheat Sheet Series, 2021)
Sensitive data should be encrypted at all times. Organisations must ensure all devices and networks are encrypted. Encryption is the process of transferring plain text into chiper text, an unreadable format, this ensures the confidentiality of the data.
-
-
-
-
Authentication (OWASP Cheat Sheet Series, 2021)
Authentication is the process of verifying that an individual, entity or website is whom it claims to be. Authentication in the context of web applications is commonly performed by submitting a username or ID and one or more items of private information that only a given user should know.
-
Backups and archiving(Bauer, 2018)
Backup is for recovery from hardware failure or recent data corruption or loss. Archive is for space management and long term retention.
-
Tokenization(Lutkevich, 2017)
The process of turning sensitive data into non-sensitive data that can be used in a database or internal system without bringing it into scope - used to secure sensitive data
Hashing(“2BrightSparks,” 2021)
Process of transforming any given key or a string of characters into another value - a hash function generates new values known as a hash value or simply a hash
Access Control(Martin, 2019)
Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to company data. At a high level, access control is a selective restriction of access to data. It consists of two main components: authentication and authorization, says Daniel Crowley, head of research for IBM’s X-Force Red, which focuses on data security.
Data masking( Imperva, 2021)
Data masking is a way to create a fake, but a realistic version of your organizational data. The goal is to protect sensitive data, while providing a functional alternative when real data is not needed—for example, in user training, sales demos, or software testing.
Deletations and erasure(Ontrack, 2020)
Data deletion leaves data recoverable, while data erasure is permanent; this is especially important for businesses, as getting these two terms confused can present significant issues.
-
Client Side
-
Algorithms
-
the retrieval and display of the required data from the dataset for each event/activity based on the event/activity template (type) selected by the user
-
-
the retrieval and display of the required data from the dataset based on the event/activity template (type) selected by the user
Data Exhange
Data exchange components (“Harvard,” 2020)
-
-
-
Although these three elements are independent, there are popular and commonly used combinations. For example, the popular RESTful API mechanism typically consists of the Representation State Transfer architectural style, the JavaScript Object Notation (JSON) format and the secure HTTPS protocol. Although certain combinations are common, they are not fixed, and various combinations of elements can be used to create a data exchange method.
Data exchange Methods (“Harvard,” 2020)
-
-
Data Streaming
Multiple data sources transfer data continuously to a receiving process. Stream processing ingests a sequence of data, and incrementally updates metrics in response to each arriving data record. It is well suited to real-time monitoring and response functions.
-
Remote Procedure Call
A computer program causes a procedure to execute in a different address space (commonly on another computer on a shared network).
File Transfer
An application stores data in a file which is transferred to a destination location, then loaded into the destination system. These might be JSON, XML, CSV, or one of many other text-based or binary file formats.
Extract, Transform, and Load (ETL)
Data is transferred by allowing one application to establish a direct connection to another application’s database to read and write data. Extraction, translation and loading (ETL) is an extension to the direct database connection approach that adds data batching, data transformation and scheduling tools.
-