Get Started. It's Free
or sign up with your email address
Rocket clouds
Web Engineering by Mind Map: Web Engineering

1. Tipes of Web Application

1.1. Open

1.1.1. Accessible for anyone who open an account.

1.1.2. Free or paid.

1.2. Closed (or line-of-business application)

1.2.1. Not accessible outside of the company that uses it.

1.2.2. Considered “offline”.

1.2.3. Usually run on the company’s local network only.

1.2.4. Available only to employees.

2. Different Digital Media and Features for use on the web

2.1. Graphics

2.1.1. There are

2.1.1.1. Animation

2.1.1.2. 3D

2.1.1.3. Bitmap

2.1.1.4. Vectors

2.1.1.5. Photocasting

2.1.1.6. Layers

2.1.1.7. Assigned Design by CAD

2.1.2. Formats

2.1.2.1. GIF

2.1.2.1.1. Compressed/ Cannot lose quality/ 8 bits

2.1.2.2. TIF

2.1.2.2.1. Compressed/ Cannot lose quality/ 64 bits

2.1.2.3. PNG

2.1.2.3.1. Compressed/ Cannot lose quality/ 32 bits

2.1.2.4. BMP

2.1.2.4.1. Compressed/ Cannot lose quality/ 24 bits

2.1.3. Properties

2.1.3.1. Size

2.1.3.1.1. es

2.1.3.2. Resolution

2.1.3.2.1. es

2.1.4. Moods

2.1.4.1. CMYK

2.1.4.1.1. Four color channels with 8 bits

2.1.4.2. RGB

2.1.4.2.1. Three light channels with 8 bits of deep

2.1.5. Light Properties

2.1.5.1. Exposition: Quantity of captured light

2.1.5.2. Brightness: Clarity

2.1.5.3. Tone/Color: Two moods to work on

2.1.5.4. Contrast: Difference of brightness between two points

2.2. Audio

2.2.1. There are

2.2.1.1. Video Editing

2.2.1.2. Podcast

2.2.2. Formats

2.2.2.1. MIDI

2.2.2.2. MP3

2.2.2.3. MP4

2.2.2.4. WAV

2.3. Video

2.3.1. There are

2.3.1.1. Video Editing

2.3.1.2. Videocast

2.3.1.3. Special Effects

2.3.2. Formats

2.3.2.1. AVI

2.3.2.2. MOV

2.3.2.3. MPEG

3. The Types of Vulnerability

3.1. Input

3.1.1. If it is not filtered, the information will be exposed to attacks or visible to anyone.

3.2. Output

3.2.1. If it is escaped, the information will be preserved and safe.

3.3. Attacks Cross-Site Scripting

3.3.1. Type 0

3.3.1.1. Attack based on DOM or local

3.3.2. Type 1

3.3.2.1. Attack no persistent or reflected

3.3.3. Type 2

3.3.3.1. Attack persistent and saved on storage

4. Security Protocols

4.1. HTTP Fake Requisitions

4.1.1. Applying plugins to the browsers

4.2. Applications Security

4.2.1. Do not trust database security

4.2.2. Implement Security

4.3. Card Access Exposure

4.3.1. Set the web server to deny the requisitions of not available sources

4.4. SQL Injection

4.4.1. Failures filtering the data and escaping the information while sending it to the database

4.5. Data Exposure

4.5.1. Make sure the data storage in the database are inaccesibles even to database administrators