Please enable JavaScript.
Coggle requires JavaScript to display documents.
Data Exchange Systems, . - Coggle Diagram
Data Exchange Systems
-
Data Exchange
Geo-tagging
Geo-tagging in data exchange systems associates geographic location information with digital content.
it enables the tagging or marking of data with specific location coordinates, providing spatial context.
Encryption
Encryption is the process of converting data into a coded form to protect it from unauthorised access during transmission or storage.
It involves using algorithms and cryptographic keys to transform data into cipher text, which can only be encrypted with the corresponding decryption key.
Encryption ensures data confidentiality, integrity, and privacy, providing an additional layer of security in data exchange systems.
Privacy Principals
Privacy principles in data exchange systems involve obtaining informed consent and specifying the purpose of data collection.
They emphasise minimising data collection, implementing security measures, ensuring transparency, providing individuals with control over their data, and maintaining accountability for privacy compliance.
Latancy
-
It can occur during transmission, processing, and response stages.
Factors include network conditions, processing complexity, and protocol overhead. Optimising infrastructure, protocols, and utilising caching mechanisms can reduce latency.
Format
AJAX
AJAX (Asynchronous JavaScript and XML) is not a format itself but a combination of technologies used for asynchronous data exchange between a web browser and a server.
It allows web pages to update specific parts of their content without requiring a full page reload, providing a smoother and more interactive user experience.
AJAX uses JavaScript to send HTTP requests to the server and receive data in various formats, such as XML,
HTML
HTML (Hypertext Markup Language) is a standard markup language used for creating the structure and presentation of web pages.
It defines the elements and tags that are used to structure the content and layout of a web page, including headings, paragraphs, links, images, and more.
HTML is the primary language understood by web browsers and serves as the backbone of the World Wide Web, allowing information to be displayed and exchanged across different platforms and devices.
XML
XML (eXtensible Markup Language) is a widely used format for structuring and representing data in a hierarchical manner.
It is a text-based format that uses tags to define elements and attributes to provide additional information about the data.
XML is platform-independent and can be easily parsed and processed by various programming languages and applications, making it suitable for data exchange between different systems.
JSON
-
It is a text-based format that represents data objects as key-value pairs, making it easy for humans to read and write and for machines to parse and generate.
JSON is widely used in data exchange systems as it is supported by many programming languages and is commonly used for transmitting data between a server and a web application or between different components of a system.
CSV
-
CSV is a plain text file format for data storage and exchange, with values separated by commas.
It is widely supported and used in various applications, including spreadsheets, databases, and data analysis.
-
-
API
The DELETE method is used to remove a specified resource from the server. It requests the server to delete the resource identified by the given URI.
The POST method is used to submit data to the server to create a new resource. It sends data in the body of the request to be processed and stored on the server.
The GET method is used to retrieve data or resources from the server. It sends a request to the server to fetch the information specified by the given URI and receives the response containing the requested data.
The PUT method is used to update or replace an existing resource on the server. It sends data in the body of the request to be stored at the specified URI, replacing any existing data.
Jitter
-
It can disrupt real-time applications and lead to delays, packet loss, and degraded quality.
Techniques like buffering, prioritisation, and synchronisation are used to mitigate and minimise jitter for reliable communication.
Data Security
Usability
Data security usability in data exchange systems aims to maintain a balance between effective security measures and user-friendly functionality.
It involves implementing user-friendly security measures, providing streamlined interfaces, and offering training to educate users on data security best practices.
The goal is to ensure that security measures do not overly burden users or impede their workflow while still maintaining a high level of data security.
Privacy
Data security and privacy in data exchange systems involve protecting data from unauthorised access, ensuring confidentiality, integrity, and availability.
This includes implementing security measures like encryption, access controls, and compliance with privacy regulations.
Data governance frameworks and secure data exchange protocols also play a role in maintaining data security and privacy.
e.g. SQL Injection, Identity Theft
Safety
Data security safety in data exchange systems focuses on preventing threats and vulnerabilities that can compromise data confidentiality, integrity, and availability.
It involves implementing measures like threat prevention, data integrity checks, backup and recovery plans, incident response procedures, and compliance with security standards and regulations.
-