Web Development

In: Computers and Technology

Submitted By cpombo
Words 471
Pages 2
Week 7 Homework

July 16, 2012



1. Explain the four goals associated with computer threats.

• Data Confidential- is keeping secret data secret.

• Data Integrity- unauthorized users not allowed to modify data without owner’s permission.

• System Availability- no one can disturb system making it unusable.

• Privacy - protecting individual from misuse information about them.



2. Explain the main difference between Secret-Key Cryptography and Public-Key Cryptography.

Secret-Key Cryptography the key is private and with Public-Key Cryptography the key is public.



3. What is the digital signature?

A technology used to associate a users’ identity to a public key, in which the user’s public key is digitally signed by a trusted third party.



4. What is packet sniffer?

Is a software that examines all incoming and outgoing network packets looking for certain patterns.







5. Explain the various types of attacks from inside listed in section 9.5 of the text.

1.) Logic bombs - piece of code in a production system that clears disk, erases files at random, making hard-to-detect changes to key programs or encrypting essential files

2.) Trap door - Code inserted into computer system that allows hackers to bypass the entire authentication process.

3.) Login in spoofing - A phony copy of a system login system used to obtain user id’s and password



6. Explain the difference between a virus and a worm?

Virus attach to files and spread in a system when transferring effected files, self-replicate on a local computer and inserts harmful code into files.

Worm uses the network to travel from one computer to another and self-replicate between computers on the same network.





Chapter 9 Research Assignment

Three Viruses:

1.) Stuxnet virus was discovered on June 2010, targets Siemens…...

Similar Documents

Web 2.0

... ........................................................................................................... 10 4. Web 2.0 in Businesses as support ................................................................................................ 11 4.1 Dell ........................................................................................................................................ 11 4.2 Procter & Gamble .................................................................................................................. 12 5. Web 3.0 ....................................................................................................................................... 13 References ...................................................................................................................................... 16 Section E Page 2 Web 2.0 Group 5 1. Pre-Web 2.0 1992-1995: Growth of WWW. First universal graphical browser Mosaic created. W3C founded to create standards 1999-2001: Dot-com boom and bust. Survivors had a sound business plan and a well-defined marketplace 1980: World Wide Web created by Tim Berners Lee in CERN. 1990: All tools necessary for building a working web developed – HTTP, HTML, browser, and server. Successfully implemented in CERN. 1996-1998: Commercialization of WWW. Start of free publishing and instant worldwide information 2002: Formation of Web 2.0. Weblogs and RSS started. DIY user-edited and generated websites into......

Words: 5885 - Pages: 24

Social Web

...The History of Social Web Ashley Jackson INF 103 Professor Jaclyn Minor May 24, 2012 The social web was first designed with the intention of just having a fun way to interact with friends and family over the Internet. Over the years, it has grown into one of the most popular forms of social interaction. This paper will discuss the past history of the social web, as well as the most popular sites of the present, including Facebook, Twitter, MySpace, YouTube, and Friendster. I will show the pros and cons of social networking with facts and information I have obtained through research. The term “social web” does not exclusively belong to digital technology on the Web. On the contrary, social networks have been studied since the beginning of 20th century with the aim of comprehending how the members of a certain community interact and the mechanisms through which this interaction takes place, (Postigo, 2011). Today, social networking commonly refers to all those activities that are carried out within specific online services that provide free space and software tools, which allow users to create networks of people. In most instances, a social networking service is a website that allows individuals to construct a public or semi-public profile. The profile is usually made by filling out a template with the user’s personal data. This data is not only limited to the users...

Words: 1483 - Pages: 6

Social Web

...Social Web and Users today In today’s society, the Social web is a booming industry. There is no set age limit as to who can you is. There are no boundaries as to what can be done. There are many different topics involved in using the social web. There are pages like Facebook, Twitter, and Instagram that are like the online diaries of social web. Then there is Youtube which is like a database of nothing but videos for people to search. There are also websites like LinkedIn, a professional network. There is also online dating pages and pages for stock markets as well. There are so many social web sites that affect every ones lives in different ways. It is amazing how I am able to connect with people from school, professional arenas, social arenas, and social networks all by internet. On the internet, we have websites like Facebook. Facebook originally started out for college students only. Now it has evolved into a page that any aged person can have. It is a place to upload pictures and videos. You can keep people updated on your life from across the world. As of right now Facebook has over 845 billion active users. People upload over 250 million photos every day. Facebook has been used to promote celebrities and other businesses. People can have a Facebook page to raise money from a fundraiser or get people interested in their product or business. Statistics show that there are more males on Facebook then females. Also the 55 and up age group grew 922.7% in 2009. It...

Words: 1790 - Pages: 8

Web Development

...Week 7 Homework July 16, 2012 1. Explain the four goals associated with computer threats. • Data Confidential- is keeping secret data secret. • Data Integrity- unauthorized users not allowed to modify data without owner’s permission. • System Availability- no one can disturb system making it unusable. • Privacy - protecting individual from misuse information about them. 2. Explain the main difference between Secret-Key Cryptography and Public-Key Cryptography. Secret-Key Cryptography the key is private and with Public-Key Cryptography the key is public. 3. What is the digital signature? A technology used to associate a users’ identity to a public key, in which the user’s public key is digitally signed by a trusted third party. 4. What is packet sniffer? Is a software that examines all incoming and outgoing network packets looking for certain patterns. 5. Explain the various types of attacks from inside listed in section 9.5 of the text. 1.) Logic bombs - piece of code in a production system that clears disk, erases files at random, making hard-to-detect changes to key programs or encrypting essential files 2.) Trap door - Code inserted into computer system that allows hackers to bypass the entire authentication process. 3.) Login in spoofing - A phony copy of a system login system used to obtain user id’s and password 6. Explain the difference between a virus and a worm...

Words: 471 - Pages: 2

Web Development I Class

... Patricia Goodwine Discussion Board 2 19 February 2013 In the student tool called M.U.S.E, it touches upon the subjects within the Web Development I class. The videos which are needed to view for the upcoming first Individual Project are; Introduction to Phase 1, How to Use the eBook, Introduction to Dreamweaver, How to Choose the Right Colors, Introduction to Photoshop and Phase 1 IP Demo; is to help students understand what is needed to complete the project. In the follow paragraphs, will explain how this work. With the ‘Introduction to Phase 1’ video, the instructor shows what the class is about and what to do in a step-by-step matter with the Dreamweave. It also states how to use the videos if someone gets overwhelm, what do to. In the next video, ‘How to Use the eBook’, it helps students understand how the eBook works alongside Photoshop and Dreamweaver while the student is building their web site. In the ‘Introduction to Dreamweave’ video, the instructor explains to students how Dreamweave is used, as well as some advice where to start and how to get comfortable with the program. The video ‘How to Choose the Right Colors’ shows how and why to pick the right colors for your web site, which can make all the difference between a bad or great web site. As in the ‘Introduction to Dreamweave’ video, ‘Introduction to Photoshop’ it helps the student understand how to take a screenshot, using the Clipboard and cropping images. Finally, in the video ‘Phase 1 IP Demo’, he gives......

Words: 377 - Pages: 2

Web Development

...CHAPTER I THE PROBLEM AND ITS SETTINGS Introduction In modern lives, people are exposed to a great amount of visual stimuli from the modern media (Forlizzi 2002: 3) and the Internet has grown to become one of the most notable main media channels. The advancement of internet technology has generally promoted the convenience of communication in our modern lives. Owing to the contributions through the efforts of numerous experts, scholars and industries as well as the spread of wide broadband internet in recent years, merely usability has become an insufficient criterion to can no longer satisfy users’ needs. Only with user-friendly and attractive content can on a website can ensure its continuous usage, make users to be willing to continue visit this website. Meeting the preferences of certain user groups is the key to increasing message transfer and communication efficiency (Goguen 2003). Website development has come a long way since the mid-90s when the Web explosion took place. Early websites were often written by individuals and were text-only affairs; nowadays sites are frequently constructed by professional web design houses employing teams of developers as well as graphics artists, usability, accessibility, search engine and database specialists all collaborating to produce and maintain websites responsible for millions of dollars of annual revenue for their owners. Of course, not all website development and design is undertaken at this level; many design...

Words: 1288 - Pages: 6

Social Web

...Social Web Social Networking via the web can be dangerous. It sometimes produces ways for online predators to gain access to your personal information. Social can also be is advantageous and fun even though there are some potential risks. Millions of people use the Social web mainly for socializing with friends and family but many also use it to promote their business. “The social web is a set of social relations that link people through the World Wide Web. The Social web encompasses how websites and software are designed and developed in order to support and foster social interactions. These online social interactions form the basis of much online activity including online shopping, education, and gaming.” http://en.wikipedia.org/wiki/Social_web. Popular Social Networking sites are Facebook, Twitter, and Myspace. These sites allow millions of people to connect with their family and friends using instant message, pictures, and videos. I would suggest before engaging in social media sites you should take necessary precautions to protect your personal information. There are millions of people that use the social web to interact. “The Social web is a set of social relations that link people through the World Wide Web. The Social web encompasses how websites and software are designed and developed in order to support and foster social interaction. These online social interactions form the basis of much online activity including online shopping, education, gaming and...

Words: 971 - Pages: 4

Build a Web Applications and Security Development Life Cycle Plan

...Build a Web Applications and Security Development Life Cycle Plan What are the elements of a successful SDL? The elements of a successful SDL include a central group within the company (or software development organization) that drives the development and evolution of security best practices and process improvements, serves as a source of expertise for the organization as a whole, and performs a review (the Final Security Review or FSR) before software is released. What are the activities that occur within each phase? Training Phase- Core Security Training Requirements Phase- Establish security requirements, create Quality Gates/Bug Bars, perform Privacy Risk assesments. Design Phase-Establish Design Requirements, perform Attack Surface Analysis/Reduction, use Threat Modeling Implementation Phase- Use approved tools, Deprecate unsafe functions perform static analysis Verification Phase- Perform Dynamic Analysis, Perform Fuzz Testing, Conduct Attack Surface Review Release Phase- Create an incident Response Plan, Conduct Final Security Review, Certify release and archive Response Phase- Execute Incident Response Plan Phase Activities Roles Tools Requirements - Establish Security Requirements -Create Quality Gates/Bug Bars -Perform Security and Privacy Risk Assessments -Project Managers -Security Analysts -Microsoft SDL Process Template for Visual Studio Team System - MSF-Agile + SDL Process Template Design -Establish Design Requirements -Perform Attack...

Words: 2006 - Pages: 9

Web Mining

...First Draft By Daniel Nunez Nov 23, 2014 WEB MINING A. INTRODUCTION The abundant data present in the World Wide Web (web for short) through the internet is vast on useful information. User-specific information of how they interact with the Web and system-specific data of how the Web is structured as more and more bytes of information get uploaded and shared through the Web are examples of how there is vital information to be studied and reflected upon with the means of finding deep, valuable, new knowledge that could potentially make numerous computer enterprises increasingly effective. The “figuring out” of what is relevant, yet unknown in large sets of data through observation and analysis is the task of data mining. Data mining relies on sophisticated approaches and methods, such as artificial intelligence, statistical deduction and induction, information retrieval and natural language processing (NLP) [2], of going through large amount of organized or unorganized data to find “capitalizeable” patterns and potentially useful information. With this preliminary description of data mining partial intricacies, I proceed to define Web mining as the application of data mining practices to search and find, filter, extract and assess [4] Web data to better understand its contents, structure, usage[1][2][3][4] and processes[4]. Web mining practices have been classified between three qualitative categories: Web content, Web structure, and Web usage [1][2][3][4...

Words: 797 - Pages: 4

Web Applications

...Introduction The term ‘online’ is the state of being connected to a network of computers or other devices. This term is often used to refer to someone who is currently connected to the internet. Information system is an integrated set of components for collecting, storing, processing, and communicating information. Individuals, corporations, and businesses alike all rely on information systems to manage their operations, compete in the marketplace, supply services, and balance daily lives. As an example, corporations rely on information systems to process financial accounts, manage human resources, provide basic services, study, shop, and bank. An information system (IS) is defined by the free dictionary as a set of inter-related components working together to collect, retrieve, process, store, and distribute information in order to facilitate the planning, control, coordination, analysis, and decision making in companies and other organizations. The World Wide Web (WWW) has become the largest sources of information. However, its content cannot be manipulated in a general way because of two main issues: (1) Finding relevant information is a difficult task and (2) the web is unstructured. Search engines such as Altavista, Google, Lycos, and many others offer some form of structure and comfort to users, however, their query facilities are often limited and come in the form of HTML pages. Most of the information present on the web is stored in a HTML format. HTML...

Words: 1045 - Pages: 5

Web Page

...Web page A web page or webpage is a document commonly written in HyperText Markup Language (HTML) that is accessible through the Internet or other network using a browser. A web page is accessed by entering a URL address and may contain text, graphics, and hyperlinks to other web pages and files. The page you are reading now is an example of a web page. HTML Developed by Tim Berners-Lee in 1990, HTML is short for HyperText Markup Language. HTML is used to create electronic documents (called pages) that are displayed on the World Wide Web. Each page contains a series of connections to other pages called hyperlinks. Every web page you see on the Internet is written using one version of HTML code or another. Hypertext A method of organizing and accessing text or other data, such as tables, presentational content and images, through the use of hyperlinks. Today, anyone who has been on the Internet is familiar with hypertext as it is in every link they click or tap. Hypertext is a concept that was mentioned in an Atlantic Monthly article in 1945 by Vannevar Bush, who talked about a photo-electric mechanical device called a Memex (short for memory extension) capable of creating and following links between documents on microfiche. This concept was later coined by Ted Nelson in 1965 who worked for and with Andries van Dam at Brown University. Andries, with the help of Ted and other Brown University students, created a Hypertext Editing System (HES). However, the first public...

Words: 1300 - Pages: 6

Advanced Web Development

...Advanced Web Development/WEB 407 Introduction Kudler Fine Foods is a specialty food store offering imported and domestic fare including baked goods, meats & seafood, produce, cheese & dairy, and wine. With three locations in the San Diego metropolitan area (La Jolla, Del Mar and Encinitas), Kudler’s mission is to provide their customers with, “…the finest in selected foodstuffs, wines, and related needs in an unparalleled consumer environment” (Apollo Group Inc. 2009). In an effort to increase customer convenience and business revenue, Kudler Fine Foods wants to sell their products on the internet. By adding both item inventory and online ordering pages to their current site, Kudler Fine Foods can accomplish this goal. There are, however, additional systems necessary on the back-end to make this system possible. According to TheConsumerCollective website (2010), “E-commerce spending continues to outpace analyst’s predictions… spending will reach $259 billion in 2014, and $278.8 billion by 2015” (Suetos, 2010). Over the past few years, customer confidence with online shopping has increased significantly. Customers feel more at ease with purchasing their products from online retailers than they did just years ago. This proposal will demonstrate the major components necessary for Kudler Fine Foods to begin offering their products online. It will discuss the database design, how the scripting language PHP will be set up to provide a “shopping cart” for...

Words: 3409 - Pages: 14

The Foundation of Web Development

...The Foundation of Web Development Name Class College Name Instructor The Foundation of Web Development The internet, an international network linking and communicating thousands upon millions of computer devices, concerns an immense and impressive networking foundation, or framework. The web or the World Wide Web is not the internet, but instead consists of a method of acquiring data throughout the internet sharing the vast abundance of information. As soon as the web became an exclusive entity, web development was introduced. This article summary will evaluate how HTML, CSS, and JavaScript became the foundation of web development for the web. “The basic building blocks of the World Wide Web are the three most commonly-used web standards — HTML, CSS and JavaScript” (W3C, 2011). Web development communicates with the web to contribute to its performance, which seem similar to the primary components of a house, or any other structure of the sort. A house, for instance, consists of a concrete foundation (the internet), the house structure and engineering components (the web), and the décor, interior design, and Feng shui (HTML, CSS, and JavaScript). These technologies (HTML, CSS, and JavaScript) work side-by-side to create artistry in the form of websites, web apps, and everything else roaming aimlessly on the web. Hypertext Markup Language or HTML could be used as (still can be) a standalone language to create webpages and sites without the need for Cascading...

Words: 969 - Pages: 4

A Case Study of the Web-Based Information Systems Development.

...1. Introduction Over the last three years the focus of the information technology industry has moved towards development for the World Wide Web (WWW). Information systems using WWW technology, delivered by an Intranet or via the Internet, are now prevalent throughout New Zealand and overseas. Within New Zealand, a wide variety of organisations are deploying information systems onto the WWW, including banks, government departments and other service providers. They are using the WWW as a strategic business tool, supporting their existing operations or providing a low-cost solution for delivering a new product or service line. 1.1 Proposition and Aims There is an abundance of information on the graphical and user interface aspects of WWW site design. In addition, a large body of knowledge has been developed in the area of software development methodologies. However, there has been very little research conducted to examine if these existing research methodologies are applicable to the information systems developed for the WWW. The WWW is a technologically dynamic environment, and presents new challenges for developers. In order to address the emerging WWW environment, a number of researchers have proposed software development methodologies specifically for the WWW. Consequently, the aim of this research was to investigate how organisations are currently developing WWW-based information systems, and the reasons why those methods are being used. This examination is...

Words: 1709 - Pages: 7

Advance Web Development

.... It can be "GET" or "POST". Other ways for a reader to run a program are by providing a direct link to the program without allowing the reader to supply any variables through a form, or by using the <ISINDEX> tag 2. When AOLserver gets a request for a URL that maps to a CGI directory or a CGI file extension, it starts a separate process and runs the program within that process. The AOLserver also sets up a number of environment variable within that process. 3. The program runs. The program can be any type of executable program. For example, you can use C, C++, Perl, Unix shell scripts, or Fortran. In this example, the program takes the comments from the form as input and sends them to you as email. 4. Any information the program passes to standard output is automatically sent to the AOLserver when the program finishes running. 5. The server adds any header information needed to identify the output and sends it back to the reader's browser, which displays the output. Q.15 What is Perl language? Discuss the following with respect to Perl. Write the step to install Perl. Perl is a general-purpose programming language originally developed for text manipulation and now used for a wide range of tasks including system administration, web development, network programming, GUI development, and more. * Strings * Strings are scalar. There is no limit to the size of the string, any amount of characters, symbols, or words can make up...

Words: 5169 - Pages: 21