Please enable JavaScript.
Coggle requires JavaScript to display documents.
Data Exchange - Coggle Diagram
Data Exchange
Security risks
SQL injection- in the search bar of a solution, using an SQL query they can insert or search for specific data values
-
-
Integrity- there is a risk that someone might interrupt or corrupt the data message by modifying it in a malicious way or replace it with a new message
Availability- Someone may interfere with the transmission to prevent the data from reaching the intended destination
Data logging- it is possible that someone may monitor and log information inputted into the solution through the website
Security measures
Checksums
-
Checksums use a sum of numbers at the beginning and end of a data list, the last number in the string is checked by the receiver to ensure that the data has not been affected as otherwise the value would change
Hashing
Hashing is used to generate a secure message digest to verify data integrity to prevent the malicious interference.
-
Data logging
Used to monitor what users input into the site, helps detect any innapropriate language and catch any malicious wording
-
De-identification
De-identification of persons full name and exact location will prevent any major issues when it comes to the leaking of personal information.
Exchange methods
Php
Php commands can be used to insert information on a file into a MySQL database while JavaScript is used to take the data and transform it into a readable format such as in a graph or table (Also capable using php)
-
File transfer
There will be a file transfer within the solution as data from the Raspberry Pi intelligence system is manually transferred onto a USB where then the files on the USB can be used elsewhere.
-
-
-
-