Please enable JavaScript.
Coggle requires JavaScript to display documents.
spotify api - Coggle Diagram
spotify api
Programming components
Page load request (HTTP request)
HTML structures
static + dynamic components of html
HTTP get request
http response code
openActive session details
Data methods
RESTful services
AJAX
JSON
XML
data interface
HTML
tables
CSS
grids
accordion structure
sliders, scrolling containers
CIA threat protection methods
encryption
using a key to change the message that the recipient knows so the data can't be read by anyone else other than the recipient through decryption
encryption methods
TripleDES
Blowfish & twofish
AES
PGP
RSA
authentication
verification of the sender through a code or signature
Digital signatures
Digest Access Authentication
XML Digital Signature
Application tokens (keys)
Open authentication (OAuth2)
message authentication code (MAC)
Security assertion makeup language (SAML)
OpenID
checksums
ensuring the data is transmitted without being lost
Checksum generation methods
parity bits
used to detect network errors in a small data block
cyclic redundancy check
used to detect data storage errors
file checksum
used for checking that the data has been correctly transferred
hashing
generating a secure message digest to verify data integrity of the complete message to protect against malicious interference
evaluation of success of a hash algorithm
reliability
the same hash digest should be the same every time
One-way (resistance to pre-image attacks)
Impossible to construct the image with just the digest
Collision resistance
Impossible to generate identical digests from different messages
speed
Fast computations minimise the performance overheads of security processes
Hash algorithms
Message-Digest-5 (MD5)
used for speed
SHA-1
replaced MD5
SHA-256
most recent
data exchange
the data provider system
generates a JSON datset
openActive REST system
data consumer system
receives the dataset
Criteria
Prescribed
Self-determined
Payment system
data from the API
securing storage & exchange
CIA triad
Confidentiality
The potential for an unauthorised user to access the data
Integrity
the potential for the data to be intercepted and modified with malicious intent
Avaliability
the potential for the transmission to be interfered with to prevent data from reaching its destination
data structures
database - sql
Network principles
Latency
Delay between requesting data and receiving it
Latency influencing factors
seralisation
Propagation
User interface
Useability principles
Constraints