About This Chapter
Web Application Security - Chapter Summary
In this chapter, you'll find a series of short lessons on web application security you can study on any smartphone, tablet or computer. Informative video lessons outline the definition of file transfer protocol (FTP) and the different web page design and programming languages. You can work at your own pace, going back as much as needed, as you progress through this chapter. Along with each lesson, we've provided a handy and helpful self-assessment quiz to measure your understanding and help guide your study. Once you complete this chapter, you should be ready to:
- Provide a definition of and an explanation for the internet
- Define hypertext transfer protocol and simple mail transfer protocol
- Give an overview of post office protocol (POP)
- Discuss the uses for internet message access protocol
- Differentiate between Telnet and SSH
- Compare service-oriented architecture and client-server architecture
- Outline the functions of the transport layer of the OSI model
- Give examples of a denial of service (DoS) attack
- Detail the risks, threats and issues associated with mobile device security threats
- Explain mobile malware detection and analysis
1. What is the Internet? - Definition & Explanation
If someone asked you about the Internet would you tell them that it is the World Wide Web? This isn't really true, and you will learn why in this lesson as we look at the parts that make up the Internet.
2. Hypertext Transfer Protocol: Definition & Examples
HTTP is short for Hypertext Transfer Protocol, and includes the basic rules for displaying a web page on the screen of a computer, smart phone, tablet, or any mobile device. In this lesson, we'll learn about Hypertext Transfer Protocol and how it works.
3. Simple Mail Transfer Protocol: Definition & Uses
In this lesson, we'll learn the basics of Simple Mail Transfer Protocol (SMTP). We will understand its definition, the different components involved and how it is used. We'll also understand how emails are initiated and delivered.
4. Post Office Protocol (POP): Definition & Overview
This lesson will define POP, explain a little about how the technology works and how it came about, as well as give some examples of everyday usage. You'll then be able to test your new-found knowledge with a quiz.
5. Internet Message Access Protocol: Definition & Uses
In this lesson, we will understand the definition of Internet Message Access Protocol (IMAP). We will examine its characteristics and understand its uses in various applications.
6. What is File Transfer Protocol (FTP)? - Definition & Explanation
File Transport Protocol is a program that allows users and computers to send and receive large portions of data through a private or public network. It can also be used to send configuration files to network devices, such as switches and routers.
7. Telnet vs. SSH
Both Telnet and SSH allow you to access a computer remotely. In this lesson, we'll learn about the differences between the two and their respective advantages, and also take a closer look at some of the features of SSH.
8. Service-Oriented Architecture vs. Client-Server Architecture
In this lesson, we will discuss the terms Service-Oriented Architecture and Client-Server Architecture and examine their characteristics and differences.
Web design is the creation and visual design of documents displayed on the World Wide Web. It is important to create engaging and visually appealing websites to attract and retain customers. Many factors must be considered when designing a website. This video will explore the steps in Web design and the programming languages needed to create a dynamic and interactive website.
10. Transport Layer of the OSI Model: Functions, Security & Protocol
In this lesson, we'll explore the seven layers comprising the OSI model with a focus on the transport layer. During our discussion, we'll define the transport layer, examine its functions and go over the supporting network protocols.
11. What is a Denial of Service (DoS) Attack? - Definition, Types & Examples
In this lesson, we will describe a Denial of Service (DoS) and a Distributed Denial of Service (DDoS) attack and identify how these attacks occur. We will also discuss the objectives of an attack and some guidelines on how to prevent or limit the impacts of a DoS or DDoS attack.
12. Mobile Device Security Threats, Risks & Issues
The rise of mobile devices has led to a whole new set of threats, risks, and issues. In this lesson, we're going to examine how organizations and individuals seek to keep their mobile devices secure and protect the data on them.
13. Mobile Malware: Analysis & Detection
One of the most important ways to lessen the danger caused by mobile malware is to be able to detect it early through device analysis. This lesson shows you what to look for.
Earning College Credit
Did you know… We have over 220 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.