Please enable JavaScript.
Coggle requires JavaScript to display documents.
Research and Investigation - Coggle Diagram
Research and Investigation
Data Security
Security prevention methods
Hashing
Hashing is the purpose of preventing an original message and other sources from being discovered with hashes.
Checksums
Checksums are used to check files and data for any occurring errors that could have occurred during data transmission or storage.
Authentication
Authentication App
The authentication app allows for a further safeguard to your information providing more security then a email.
Two-Step Authentication
Two-Step Authentication allows for users data to be secured with a email address that gets sent emails when data is requested from the user.
Authentication is the process of confirming your identity for you to access your data and information through various Authentication processes.
Encryption
Encryption is the process of transforming data into an un-breachable format that provides full security and confidentiality to the data.
Potential Threats
Tampering
If a tampering attack occurs, the confidentiality and integrity of data is threatened.
This threat could impact the system and user data, as they would edit/date information. This could range from personal details all the way to passwords and emails.
Spoofing/Phishing
If a spoofing or phising occurs, it is an attack on false information and data can be threatened if done successfully. Providing information to spoofing or phising attacks can become serious threats to your credibility and social security data.
DDos Attack
If a DDoS attack occurs, it can prevent the web application from being online and functioning as well as shutting down any users.
This threat isn’t harmful initially, but it can become harmful if it is a DNS Flood which can flood the website and network by creating fake traffic which can temporarily stop or crash the web application.
Ransomware Attack
If a Ransomware attack occurs, this malware can be fatal and a serious threat if protection is not in place. This threat can shut down and lock down any files and sometimes demand for a ransom payment to receive a decryption key to regain your files. If an attack like this occurs, it can shutdown files from days to months depending on the severity of the attack. This attack places victims in position where paying the ransom can be the only cheapest way to regain their files.
Password Attack
If a password attack occurs, this password crack can provide your vital information and security to unknown users who have used various password cracking and phishing attacks to gain access to your login details and information that can be a fatal threat if personal data is stolen.
Data structure – FORMAT
JSON
Javascript Object Notation
Language Independant
Used for the conversion of structured data over a network
Input / Output requirements
Login Form and Sign up Form
XML
Extensible Markup Language
A markup language similar to HTML used for representing structured information
Data Interface – API information
Brisbane Food Truck API
https://www.bnefoodtrucks.com.au/
https://www.bnefoodtrucks.com.au/api/1/trucks
Mad Mex API
https://www.madmex.com.au/
https://www.madmex.com.au/nutritioncalculator/
Aquinas College API
http://www.aquinas.qld.edu.au/Pages/default.aspx
Australian Privacy Standards relevant
Australian Privacy Acts
APP1- Open and transparent management of personal information
Ensures that APP entities manage personal information in an open and transparent way. This includes having a clearly expressed and up to date APP privacy policy.
APP 3- Collection of solicited personal information
Outlines when an APP entity can collect personal information that is solicited. It applies higher standards to the collection of sensitive information.
APP 10 - Quality of personal information
An APP entity must take reasonable steps to ensure the personal information it collects is accurate, up to date and complete. An entity must also take reasonable steps to ensure the personal information it uses or discloses is accurate, up to date, complete and relevant, having regard to the purpose of the use or disclosure.
APP 11 - Security of personal information
An APP entity must take reasonable steps to protect personal information it holds from misuse, interference and loss, and from unauthorised access, modification or disclosure. An entity has obligations to destroy or de-identify personal information in certain circumstances.
Legal Requirements
Privacy Requirements
Constraints
Log in Form Details
The login information for the username and password worked successfully with the error occurring the saving process for “Forgot Password”. The prompt requests your password but however isn’t able to send an email to continue the recovering of your forgotten password. This error was solved by allowing the prompts of a email to be entered in order for the user to get a recovery email on their forgotten password.
Visualisation and Design
Due to the Food Trucks API, there was a struggle with implementing the login and signup forms into the web application because of the interference of width and PX with JSON files. However, this error was solved by navigating the API’s files and giving priority to the login and signup form by adding navigation links to give access to the forms using different hyperlinks.
HTML