Please enable JavaScript.
Coggle requires JavaScript to display documents.
Research and Investigation of Data Exchange and Data Security - Coggle…
Research and Investigation of Data Exchange and Data Security
Data Exchange Solution
Synthesise data, algorithm and coded component ideas to generate a data exchange solution that stimulates the exchange of data between two digital systems; the solution will receive data in one format and programmatically transform it into another format for sharing/displaying
Determine prescribed and self-determined criteria
Symbolise using mind maps and one or more of constructed sketches, annotated diagrams, images or screenshots
Explain
– data flow relationships within and between systems
– programming features and ideas using annotated code segments
– algorithms communicated in pseudocode
Evaluate the
– accuracy of code after testing and identify errors and actions to make improvements
– digital data exchange solution against prescribed and self-determined criteria
– functionality, useability and efficiency of the components of the digital solution
Make refinements and justified recommendations for current and future improvements.
RESTful Services
JSON
JavaScript Object Notation is a data exchange protocol based on JavaScript
PHP
PHP (Hypertext Preprocessor) is known as a general-purpose scripting language that can be used to develop dynamic and interactive websites.
HTML
HTML, in full hypertext markup language, a formatting system for displaying material retrieved over the Internet.
API
Methods
GET
PUT
POST
DELETE
Simple
easy to understand
easy and simple to implement
Open
Open format
Fast
Transmission Times
Public Vs Private
Data Provider System
Generates a JSON dataset and formats it into group activities that are transmitted over the internet to the data consumer system
Data Consumer System
Requests Data
Data Transmission
Synchronous
Asynchronous
REST
Latency
The delay between the time the applicant requests data unit it receives
Data exchange solution
Algorithms
Data flow diagrams
User Requirements
An algorithm to retrieve and process data for user authentication
An algorithm to retrieve, process and display data from an API
Be accessible from different devices
Retrieve data in one format and programmatically transform it into another format for sharing/displaying
Accessing the application via a web link form the school's website
Data exchange component that stimulates exchange of data between digital systems
Data exchange component that stimulates exchange of data between digital systems
Low-fidelity application for Social Club members
Users will have to go through an authentication process
Use an existing database of Social Club users
Connect to and access datasets from a publicly available API
Display filtered content of these datasets through the web application
MOSCOW Method
Self determined criteria
Prescribed Criteria
Data privacy and security implications
Economic, social and personal impacts
Recommendations
Further security
Passwords, further authentication
Hashing of passwords
Testing Strategies
Lighthouse
Existing Solutions
Process for exporting and importing data between two digital systems
Research and Investigation
Data interface, data structures and data specifications and digital methods of exchanging data
symbolise using mind maps and one or more of constructed sketches, annotated diagrams, images or screenshots
Analyse the data exchange problem to identify the data structures, including data input and output requirements and data exchange methods
Determine data exchange system requirements
Evaluate against prescribed and self-determined criteria the most suitable process
for exporting and importing data between the two digital systems.
Recognise and describe key elements of
– a data exchange application
– components of data exchange systems
– data security processes
User Interface
Dynamic Data
Static Data
Usability Principle
Accessibility
Safety
Utility
Learnability
Effectivness
Principles of Visual Communication
Balance
Proximity
Harmony
Alignment
Contrast
Repetition
Hieracy
Elements of Visual Communication
Space
Line
Colour
Shape
Texture
Tone
Form
Proportion
Scale
Signup/Login
Login
Username, Password (Hashed)
Signup
Phone Number, Email, Username and Password (Hashed)
Signup and Login Authentication
Useability Principles
Accessibility
Learnability
Safety
Utility
Effectiveness
Privacy Principles
Secure user information
Australian Privacy Principles
Website operates on secure server
CARP
Repetition
Alignment
Contrast
Proximity
Page Layout
Buttons
Link
Bold Text
Menu Bar
Font, text size and colour
Breaking news page
Security
Authentication
Authenticating the sender's identity using a digital signature or authentication code
Encruption
Making the communication unreadable while in transit but enabling the authorised recipient to decrypt it with a secret key
checksum
Preventing unintentional data loss or corruption and ensuring reliable data transfer
Hashing
developing a secure message digest to verify the whole message's contents integrity and protect against malicious interface
Client Problem
User Problem
Target Users
Proto Personas
Megan
Age
– 25
Device
– Laptop
Browser
– Safari and Google
What will the user use the application for?
– Keeping up to date with specific News headlines
Interests
– Politics
Jenny
Age
– 17
Device
– Laptop
Browser
– Google
Interests
– News in Australia
What will the user use the application for?
– Learning more about breaking news in Australia
Josie
Age
– 15
Device
– iPhone and Laptop
Browser
– Internet explorer
What will the user use the application for?
– To keep track of the Australians competing at the Commonwealth games
Interests
– Commonwealth games
Interface Design
Wireframe
Lucid Chart
Balsamiq
STM Social Club
Members should have access the application via a web link from the schools website
Users must go through an authentication process
Usage of existing database of Social Club Users
Connect to and access to database form publicly available API
Be accessible from different devices
Impacts
Economic
Social
Personal
Constraints
Self-determined Criteria
Prescribed Criteria
Legal
Time
Data
School
Scope and Boundaries
Data Security Process
Asymmetric
Encryption using public and private keys
Symmetric
Encryption uses same key to encrypt and decrypt
Internet Protocols
FTP
File Transfer Protocol is used to exchange files over the internet
HTTPS
'S' stands for safe. It is the secure version of HTTP using public key encryption
HTTP
Hypertext transfer protocol is a stateless request/response protocol with each message recieved is treated as an independent exchnage between client and server
VPN
Virtual Private Network is an encrypted connection between network devices
Data Types
Shared
Open
Closed
CIA Trade
Confidentially
Confidentiality involves the efforts of an organization to make sure data is kept secret or private.
Integrity
Integrity involves making sure your data is trustworthy and free from tampering. The integrity of your data is maintained only if the data is authentic, accurate, and reliable.
Availability
Even if data is kept confidential and its integrity maintained, it is often useless unless it is available to those in the organization and the customers they serve. This means that systems, networks, and applications must be functioning as they should and when they should. Also, individuals with access to specific information must be able to consume it when they need to, and getting to the data should not take an inordinate amount of time.
Programming and Developer Tools
Data Tables
Algorithms (Pseudocode)
Effective
Connect in a logical way
Efficient (fewer number of steps)
Code
CSS
HTML
PHP
SQL
Select
Insert
an algorithm to retrieve, process and display data from an API
an algorithm to retrieve and process data for user authentication
efficient and accurate code.
News API
Date Exchange requirements
Confidentiality
Availablility
Integrity
Security
Public and private key to access JSON
API Filter
Search
Title
Publish Date
Country
Description
Source ID
Image
URL
Link
Data
JSON File
User can view the latest breaking news stories for that day and also filter the data by searching for a specific topic
News Website Data Exchange
Access to all features of the website
Use an existing database of Social Club users
User data login information
Data format
PHP
HTML
MySQL
Tables
tblusers
stores data of users signup and login details
Processes uploaded data, user sign up and login in to database
An algorithm and code is used to process the uploaded data