LESSON 1 Flashcards
a collection of interconnected software components that interact to deliver information and services via the World Wide Web.
Web systems
Blending the best of web and mobile apps.
Progressive Web Apps (PWA)
Efficient and responsive user experiences.
Single Page Applications (SPA)
Reducing the need for traditional server management.
Serverless Architecture
Running high-performance applications in the browser.
WebAssembly
Enhancing user experiences and functionalities.
Artificial Intelligence and Machine Learning Integration
Enhancing security and transparency in web transactions.
Blockchain Technology
Web-based applications allow users to perform tasks such as
online banking
shopping
managing data
communication.
A cloud-based word processing application.
Google Docs
A customer relationship management (CRM) platform.
Salesforce
A music streaming service.
Spotify
An e-commerce platform.
Amazon
A project management tool.
Trello
Available from anywhere with an internet connection.
Accessibility
Lower upfront costs compared to traditional software.
Cost-Effective
Easily scalable to meet business growth.
Scalability
Centralized updates and maintenance.
Maintenance
Facilitates remote work and collaboration.
Collaboration
part of the web system that users interact with
Front-End (Client-Side)
process requests and deliver content
Back-End (Server-Side)
Stores and manages data
Database
Allow different software components to communicate and share data.
APIs
The System Parts
Login Page
Homepage/Landing page
Dashboard
User Registration
Audit Trail / Log History
a crucial component of many online applications that require user authentication and access control.
Login Page
also known as a landing page, initial webpage that users encounter when they visit a website.
Homepage/Landing
user interface component within a web application that provides users with an overview of key information, metrics, and data relevant to their activities or interests.
Dashboard
series of steps that allow individuals to create accounts
User
also known as a log history or audit log, is a record of all activities, events, and transactions that occur within a web application.
Audit Trail / Log
displays the login form
User Interface (UI)
submit the information by clicking a “Login” button
Data Submission
user gains access to specific resources
Access Control
a combination of a username or email address and a password.
Credentials
performs validation checks
Server-side Validation
session taken usually stored in a cookie or as part of the web application’s state
Session Management
system considers the user authenticated
Authentication:
display an error message informing the user that the login was unsuccessful
Failed Login Handling
Implementing secure practices is vital to prevent unauthorized access and data breaches.
Security Considerations
users can choose to log out of the system, which invalidates their session token and revokes their access to restricted areas.
Logout
top portion of the homepage usually contains the website’s logo,
Header and Navigation
prominent area at the top of the homepage that often includes a captivating image, video, or visual element
Hero Section
help create an appealing and visually engaging homepage
Visual Elements and Imagery
features a concise and compelling statement that outlines the main benefits
Value Proposition
strategically placed buttons throughout the homepage
Call-to-Action (CTA) Buttons
highlighting the key features, products, or services the website provides
Features or Services Showcase
Providing information about the company, its mission, values, and team members
About Us or Company Information
homepages display snippets of recent blog posts,
Featured Content or Blog Posts
Incorporating testimonials, reviews, or user success stories adds credibility to the website’s claims.
Testimonials and Social Proof
Including links to the website’s social media profiles
Social Media Links
Displaying contact details
Contact Information
representing a specific piece of information or metric
Widgets or Modules
contains additional navigation links
Footer
help users quickly grasp trends, patterns, and relationships in the data
Visual Representations
highlight the most critical metrics
Key Performance Indicators (KPIs)
pull data from various sources
Data Integration
ability to customize their dashboard layout and content
Customization
provide real-time or near-real-time updates
Real-time Updates
allow users to drill down into more detailed data
Drill-down Capability
enable users to interact with the data, such as filtering
Interactivity
adapting to different screen sizes and devices
Responsive Design
implement access controls to ensure that users only see the data
Security and Access Control
allow users to create multiple customized layouts
Customizable Layouts
include features for sharing and collaborating on specific insights
Collaboration Features
users visit a website or application for the first time
Registration Form Display
requires users to provide certain mandatory information
Required Information
registration process involves account activation by verifying the user’s identity
Account Activation
receive an email containing a verification link
Email Verification
addition to required information
Optional Information
users create strong passwords
Password Security
accept the website’s terms of use and privacy policy
Privacy and Terms Acceptance
registration form should have validation checks to ensure that the entered information is in the correct format and meets requirements
Validation and Error Handling
users are typically shown a confirmation message
Confirmation Message
users should have access to their account settings
Account Management
users are usually given the option to log in immediately
Login Option
system should implement security measures such as CAPTCHA
Security Measures
captures a wide range of events, including user logins
Event Logging
track of user interactions
User Activity Tracking
indicates the exact date and time when the event occurred
Timestamps
detailed information about the event
Event Details
identities of users who initiated actions
User Identification
include the IP address and location from which each action originated.
IP Address and Location
retained for a specified period
Retention and Archival
store the state of the data before and after the event
Data Before and After
restricted to authorized personnel to prevent tampering
Access Control
search and reporting capabilities that allow administrators to filter and query logs based on different criteria.
Search and Reporting
configured to trigger alerts or notifications for specific types of events
Alerts and Notifications
integrated with security information and event management (SIEM) tools
Integration with Security Tools