Friday, August 9, 2019
Information Security implications of using Java and AJAX Term Paper
Information Security implications of using Java and AJAX - Term Paper Example In fact, information technology based systems are currently more commonly used for business and personal tasks. However, distributed and e-commerce systems and applications normally depend on a wide variety of features and technologies in their realization, comprising scripting languages, web, server side systems, mobile processing and in fundamental database. Additionally, the mixture of these systems and technologies produces a system that necessitates extra concentration regarding various kinds of security and privacy issues and the system all together. In this scenario, in systems working and operations, these issues take place from the interactions of privacy and security arrangements accessible for every component (Lindquist, 2002). This research presents an analysis of the information security implications of using JAVA and AJAX. This research will focus on the security implications of using Java and AJAX, such as how easy/difficult it would be to secure a Java/AJAX applicatio n. This paper will also offer some recommendations for programmers who use Java/AJAX as a programming platform. This research will also present some of the major strengths and weaknesses, common security vulnerabilities and demonstration of findings regarding security and privacy issues. JAVA Programming and Security Issues One of the major software design considerations for the Java based platform is to offer a protected environment for running mobile code. Basically, the Java programming language encompasses its own exclusive set of safety and privacy aspects and challenges. In view of the fact that the Java security structure can defend a client and systems from hostile applications and can be downloaded over a network, hence it cannot protect beside system implementation issues that appear in the trust system code. Additionally, similar issues and bugs can involuntarily open a large number of security holes that the security arrangement was intended to hold, including access to printers, files, microphones, webcams and the network from behind firewalls. In some of the hardest issues local applications can be Java security disabled or executed. Without a doubt, these issues can turn the system into a zombie platform, take secret information from system and web, stop helpful process of the system; spy through linked devices, support additional security based attacks, and a number of other malicious tasks. In addition, the selection of programming language for system developments influences the robustness of a software application. In this scenario, the Java programming language and virtual machine offer a number of characteristics to ease and support common software programming issues and problems. Additionally, the programming language is type-safe, and the run-time offers automatic system memory management
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.