Account
Please wait, authorizing ...

Don't have an account? Register here today.

×

Divergences in Internet applications


The forms used in the application of computer security in the main areas of development propose different options, let's see part of the problem.

By Osvaldo Callegari


Protection for business information

Within the globalized scheme of communications, there is a role that remains insurmountable: the need to ensure the transport of information.

When a company sells a product, whether it is called an operating system, management system, etc., it offers it as a finished product that is not really such.

- Publicidad -

Why do we say this? There is an elegant way to promote what we acquire, the application needs to incorporate an improvement to increase security, in short a patch. Now, the question is is a security patch or modifications is not somehow a complete sign that the system is not complete?

On the other hand, there is the manifesto that is included with the paranoia buystrap, where we accept the rules of the game. This is quite misrepresented. Now companies learned to do their homework, because they are looking for other companies that provide certification services that endorse these products, as we commonly say "before leaving the oven". We can mention two companies that are certifying with very good response in the market, they are West Coastal Labs and Inteliguardians LLC. In the future, new providers of this service will emerge because it is a demand demanded by new technologies.

That is why we see how certain companies apply certain products to be at the forefront or anticipate the challenges of the vulnerabilities of their systems.

The Great Highway: Internet

Today the transport of information goes along a very wide road that is the Internet, of course until recently we said that it was not entirely stable, but with the incorporation of voice services as a strong product that lowers the costs of companies, necessarily the feedback of the Internet is becoming solid through new demands of communication n.

To do this, by way of introduction, we expanded the operation of communications on the web and the ways to apply security to them. As a corollary we add a case study of a company that develops software for data access.

Challenges that arise in the use of web communications

- Publicidad -

As is known, communications on the web has many benefits, but at the same time they carry certain challenges such as: 

•Limited interaction: interaction on a web page is limited because it cannot communicate with the server in real time, except when it is sent by the user. For example: if a program needs to update a list field, it needs the refresh of the entire page to reach a certain field.
•Need for programming expertise: the web and its communication is still quite unknown to old-wave programmers, who were busy developing client server services, standard applications or programming on multi-core computers (mainframes); therefore they are not yet familiar with these new technologies, their scalability and portability.
• Security risks: the use of the web presents new security risks to your company's network as well as vulnerabilities when programming, since private and own data can be publicly exposed.
•Browser compatibility: Unfortunately, competition between browsers results in several differences in supporting standards, creating confusion among users, in addition to the vital importance of compatibility errors with web applications. It is advisable to check each application with different browsers. A very useful tool is NetMechanic browser, if you can download it from www.netmechanic.com/browser-index.htm
• Weaknesses of web tools: the development of web applications entails the consumption of a lot of programming time due to the absence of moderately solid or stable web tools; the existing ones require extensive knowledge and experience to be able to apply them: and the most recent ones facilitate the creation of web applications. We can cite macromedia Dreamweaver MX, Microsoft Visual Studio.NET and Codecharge YesSoftware as more robust platforms.
•Web application architecture: In general, web applications use the client/server architecture, where browsers act as thin client in a two-layer process.
•Application servers: An application server is the middle layer in the three-degree architecture or tiers. The servers process the business logic themselves and generate communication between the browser and the database.
•Web services: web services are programs that do not take information on the screen or on the web server; instead they send the output to other programs in the XML format. They do not receive the data entered by users from the keyboard, but they read the information sent to them by other services. Web services allow programs to exchange information over the Internet and run remote applications as part of a local system software.·    •Cookies: Cookies are small data sent by a program to the browser and stored on the local computer to be retrieved later.
•Session variables: Session variables are similar to common local variables, which in turn are used to store information that can be retrieved by other pages during the course of a user session. Within them is stored the ID of the person who entered and other auxiliary data.
•Application variables: application variables are available on all pages of a web application, they can be accessed by all users who are not in the current session precisely. All of these variables are initialized when the server is restarted.

The GET and POST methods

When you create web pages that contain fields with data entry, the fields appear among the following marks that create a form:  <form> and

The first method causes the information entered in the form to be sent to the server when the user clicks on a submit button. The POST method generates that the information sent travels in a data stream invisible to the user. With the GET method, a new page is generated in the default browser with the requested parameters followed by a question mark and each parameter separated by the ampersand & sign.

For example, if a form asks a user to enter first and last name after submitting the form, the user is redirected a new page to a link like this: http://www.misitio.com/pagina1.asp?nombre=James&Apellido=BondEstos commands can be generated manually by entering the link to the browser where additional information exists. The server program that is currently running will only accept information in the original format of the data and content it uses.

- Publicidad -

Use a firewall to secure access to the Internet.

Computers that publish their data over the Internet are exposed to various security risks such as hackers or virus infections. Because of these risks, we recommend that you use a firewall to filter out unwanted external requirements.

The firewall must be configured to meet a specific criteria and filter all incoming and outgoing traffic, and in turn have a port policy. Many firewalls work as routers and or proximity servers, allowing with a single device to give Internet connectivity to all computers. Due to security risks, firewalls have grown exponentially.

Advanced Security Configuration Tables

These tables allow you to extend security settings within applications. The example we show is from YesSoftware's  CodeCharge programming environment.

We saw examples of applications, languages, and how security is applied through encryption. This is a fairly extensive topic to discuss in an article, but as always it is our theme to bring the reader brushstrokes of technologies to allow him to at least obtain primary concepts.

As a corollary we can say that it is important to see the certifications of the products and what verifications they have made, this speaks of the fact that we are using a safe product.

The product brands, names, functions mentioned are registered by their respective companies.

*For queries, comments and / or concerns you can write to the email [email protected]

Julián Arcila Restrepo
Author: Julián Arcila Restrepo
Chief Marketer
Communications professional, MBA, specialized in designing and executing successful Public Relations and Digital Marketing campaigns with more than 14 years of experience in areas related to communications.

No thoughts on “Divergences in Internet applications”

• If you're already registered, please log in first. Your email will not be published.

Leave your comment

In reply to Some User
Suscribase Gratis
SUBSCRIBE TO OUR ENGLISH NEWSLETTER
DO YOU NEED A SERVICE OR PRODUCT QUOTE?
LATEST INTERVIEWS

Webinar: NxWitness el VMS rápido fácil y ultra ligero

Webinar: Por qué elegir productos con certificaciones de calidad

Por: Eduardo Cortés Coronado, Representante Comercial - SECO-LARM USA INC La importancia de utilizar productos certificados por varias normas internacionales como UL , Ul294, CE , Rosh , Noms, hacen a tus instalciones mas seguras y confiables además de ser un herramienta más de venta que garantice nuestro trabajo, conociendo qué es lo que certifica cada norma para así dormir tranquilos sabiendo que van a durar muchos años con muy bajo mantenimiento. https://www.ventasdeseguridad.com/2...

Webinar: Anviz ONE - Solución integral para pymes

Por: Rogelio Stelzer, Gerente comercial LATAM - Anviz Presentación de la nueva plataforma Anviz ONE, en donde se integran todas nuestras soluciones de control de acceso y asistencia, video seguridad, cerraduras inteligentes y otros sensores. En Anviz ONE el usuario podrá personalizar las opciones según su necesidad, de forma sencilla y desde cualquier sitio que tenga internet. https://www.ventasdeseguridad.com/2...

Webinar: Aplicaciones del IoT y digitalización en la industria logística

Se presentarán los siguientes temas: • Aplicaciones del IoT y digitalización en la industria logística. • Claves para decidir el socio en telecomunicaciones. • La última milla. • Nuevas estrategias de logística y seguimiento de activos sostenibles https://www.ventasdeseguridad.com/2...

Sesión 5: Milestone, Plataforma Abierta que Potencializa sus Instalaciones Manteniéndolas Protegidas

Genaro Sanchez, Channel Business Manager - MILESTONE https://www.ventasdeseguridad.com/2...
Load more...
SITE SPONSORS










LATEST NEWSLETTER
Latest Newsletter