Please enable JavaScript.
Coggle requires JavaScript to display documents.
DS IA3 - Part 1 - Coggle Diagram
DS IA3 - Part 1
Data Exchange
Data Exchange Components
-
-
Data interface
The components (such as DBMS) that are connected to the “front end” of the user interface via the server interface (“back end”).
Data Exchange Formats
AJAX
Asynchronous JavaScript XML - is a web development architecture that updates small sections of the web app in the background so the page doesn’t need to be reloaded.
-
We used this for our Google Map API, so it could continually update and process itself without having to continually reload the page.
-
XML
-
It allows developers to create data tags for storing formatted data in a web page with a “hierarchical tree structure”.
Values are contained within key tags, which are contained within record tags, within dataset tags.
-
-
-
-
-
JSON
-
-
-
Some Data APIs allow Parameters to be used to control access to the data or query a subset of it only
-
Data Exchange Methods
RESTful Services
-
It is a particular architecture for setting up a client-server relationship that uses JSON or XML formatted data to allow for access to a particular resource.
Rest uses the HTTP verbs - GET, POST, DELETE, PUT
It assumes a “state-less” approach - which takes every request as a standalone (self-descriptive) request.
It assumes data will be cached - where a cache is a reserved storage location that collects temporary data to help websites, browsers, and apps load faster. It’s the ‘quickest storage there is’.
-
-
Users
-
Daniel
-
He likes gaming, digital technology and sport
-
-
-
Security
Threats to Security
-
CIA Triad
-
Confidentiality: The possibility that a person who is not authorised to see the data will do so when it is in transit.
Integrity: The possibility that someone may intercept the data message and modify or replace it with malicious intent.
Security Measures
Checksums
Fingerprint identification on the data packet. Provides a mathematical result from the binary of the data. This result is sent with the message
Hashing
Hashing is the process of converting a given key into another value. A hash function is used to generate the new value according to a mathematical algorithm.
Encryption
Is the process that scrambles readable text so that it can only be read by the person who has the secret code or description key.
Asymmetric Encryption
Asymmetric encryption works with two keys - one public and one private. The public key (the method of sending the data) is public to everyone. The private key is the only method of decrypting the data, and is kept private to ensure the exclusivity of the sent data.
Symmetric Encryption
Symmetric encryption works on a single key and is therefore faster than the alternative asymmetric encryption. For symmetric encryption, the sender must share the private key with the receiver to access the sent data/information. This, however, is less secure than asymmetric encryption as hackers only need to get one of the keys for the information.
-