Get Started. It's Free
or sign up with your email address
Rocket clouds
Web Engineering by Mind Map: Web Engineering

1. Tipes of Web Application

1.1. Open

1.1.1. Accessible for anyone who open an account.

1.1.2. Free or paid.

1.2. Closed (or line-of-business application)

1.2.1. Not accessible outside of the company that uses it.

1.2.2. Considered “offline”.

1.2.3. Usually run on the company’s local network only.

1.2.4. Available only to employees.

2. Different Digital Media and Features for use on the web

2.1. Graphics

2.1.1. There are Animation 3D Bitmap Vectors Photocasting Layers Assigned Design by CAD

2.1.2. Formats GIF Compressed/ Cannot lose quality/ 8 bits TIF Compressed/ Cannot lose quality/ 64 bits PNG Compressed/ Cannot lose quality/ 32 bits BMP Compressed/ Cannot lose quality/ 24 bits

2.1.3. Properties Size es Resolution es

2.1.4. Moods CMYK Four color channels with 8 bits RGB Three light channels with 8 bits of deep

2.1.5. Light Properties Exposition: Quantity of captured light Brightness: Clarity Tone/Color: Two moods to work on Contrast: Difference of brightness between two points

2.2. Audio

2.2.1. There are Video Editing Podcast

2.2.2. Formats MIDI MP3 MP4 WAV

2.3. Video

2.3.1. There are Video Editing Videocast Special Effects

2.3.2. Formats AVI MOV MPEG

3. The Types of Vulnerability

3.1. Input

3.1.1. If it is not filtered, the information will be exposed to attacks or visible to anyone.

3.2. Output

3.2.1. If it is escaped, the information will be preserved and safe.

3.3. Attacks Cross-Site Scripting

3.3.1. Type 0 Attack based on DOM or local

3.3.2. Type 1 Attack no persistent or reflected

3.3.3. Type 2 Attack persistent and saved on storage

4. Security Protocols

4.1. HTTP Fake Requisitions

4.1.1. Applying plugins to the browsers

4.2. Applications Security

4.2.1. Do not trust database security

4.2.2. Implement Security

4.3. Card Access Exposure

4.3.1. Set the web server to deny the requisitions of not available sources

4.4. SQL Injection

4.4.1. Failures filtering the data and escaping the information while sending it to the database

4.5. Data Exposure

4.5.1. Make sure the data storage in the database are inaccesibles even to database administrators