How do you anticipate the security of the application system so that data information does not leak and even doesn't get traded? Like seeing where the security of state officials' data regarding vaccinations is leaking

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

How do you anticipate the security of the application system so that data information does not leak and even doesn't get traded? Like seeing where the security of state officials' data regarding vaccinations is leaking

Expert Solution
Step 1

How do you anticipate the security of the application system so that data information does not leak and even doesn't get traded? 

  • An company can use a variety of application security programmes, services, and devices. Unauthorized users can be prevented by using firewalls, antivirus systems, and data encryption, to name a few examples. If a company wants to be able to foresee sensitive data sets, it can create custom application security policies for such resources.                                                                                                                                                                                                                                                                                 
  • Because the majority of the code in a native app is client-side, the secured app should be able to track bugs, malware, and vulnerabilities in the source code and design easily.                                                                                   
  • On the secured application, penetration testing must have been performed. Simulating cyber attacks on IT systems in order to find exploitable holes is what this term refers to. Penetration testing assists in the detection of IT flaws, allowing you to respond with more stringent security measures in the vicinity of your most valuable assets.                                                                                                                                                                                                             
  • The sensitive information sent from the client to the server must be safeguarded against data theft and privacy breaches. It is strongly advised to employ an SSL or VPN tunnel, which assures that user data is safeguarded by tight security procedures.                                                                                                                                                                                                                                                                                 
  • When it comes to accessing confidential information, the app should be constructed so that unstructured data is saved in the device's local file system and/or database.                                                                                                                                         
  • It is critical that the application is updated with the most recent security algorithm, and that contemporary encryption methods such as AES with 512-bit encryption, 256-bit encryption, and SHA-256 for hashing are used wherever available.                                                                                                                                                                                                                                                                                 
  • Unauthorized access should be denied, and various sorts of assaults against information systems should be avoided using security techniques. Perimeter defence is one degree of protection for your network against attacks, and it works well as a firewall against external threats. Perimeter defence is only one component of the overall security strategy.                                                                                                                                                                                                                                                                                 
  • It's critical to have security measures in place to protect backend systems against malicious attacks. The majority of developers believe that APIs can only be accessed by apps that have been programmed to do so.                                                                                                                                         
  • Sensitive data should be stored in the device's local memory to keep it safe from users. However, it is advisable to avoid keeping sensitive data because it may pose a security risk.
steps

Step by step

Solved in 2 steps

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY