Building Secure Web Applications

When working on a new web application there are some crucial aspects to your application security that all developers should follow. This applies to both a production and test environment. Just because an application is in-test or not production-ready does not excuse poor security. There are a few examples of where even ‘secure’ environments have been exploited through their test systems. Secure Development Environments Should not use real-world data and should rely on faker or placeholder data. This can be more time consuming for agile teams as the data may change over time, which is why your ORM models should… Continue reading Building Secure Web Applications

Common ICT Systems in Industry

Many Common ICT Systems have different functions, of which they have names. All businesses, schools and organisations will often require some computer system, even registration or time management. However often these systems are financially concerned and for that reason are often automated. Legacy Systems Maintain the older applications for customers who still use them. They are maintained until they become depreciated and service systems that are older or out of date. It is likely that this system has been used for a long time and it would be impractical to upgrade without replacing it being expensive, disruptive or not worthwhile. Financial… Continue reading Common ICT Systems in Industry