Please enable JavaScript.
Coggle requires JavaScript to display documents.
Research and Investigation - Coggle Diagram
Research and Investigation
data security processes
authentication
Verifying the user through checking password and username with database
Security
hashing
When user enter their password on the signup page, their password is hashed when it is placed into the database
CIA tirade
Integrity
SQL injections- when a hacker maliciously alters the code via web application input
confidentiality
there is a possibility that a user not authorized will view the data in transit
availability
A user may interfere with the transmission to prevent data from reaching the desired destination and rather unsafe location however this could be prevented by user having to have accounts in the web application in order to access the data to prevent data being used inappropriately.
internet protocols
Transmission control protocol (TCP)
a connection oriented protocol and offers end-to-end packet delivery, acting as a foundation for connection within the application
efficnet flow control: when users filter data is done so within a reasonable time frame suggesting efficiency
Stream data transfer: Users account details (uname and pword) are entered directly into the data base securely minimizing the chance of lost data
HTTP
communication protocol
the web application involves communication/requests between browser and server
FTP- File Transfer Protocol
the exchange of files over the internet
user Interface
usability principles
utility
accessibility
learnability
saftey
effectiveness
Pages
text
Bold and size chosen depending on how important the information is
Font
an engaging and visually appealing font is chosen
Colour
a pale yellow color was chosen as it was relevant to Pokémon and also visually appealing
Buttons
buttons are labeled clearly indicating what occurs when pressed.
Pale yellow background
bold black text
Pokémon images
Internet API
file formats
CSV
JSON
XML
Criteria
strategies
results
recommendations
prescribed and self-prescribed
google lighthouse
test plan
impacts
social, personal and economic
data security and privacy
Data Exchange System
API
Methods include: Delete, post, get, put
Public
simplicity:
easy to interpret
ease to use for web application
maximum flexibility of data structures through minimization of query complexity
efficiency achieved through fast transmission lines
Robust
errors are mitigated through testing
manage of failed requests
Latency
the delay between when the application requests the data and when it is received
data transmission
synchronous
rest
asynchronous