You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Website/docs/digitalsupportnotes/Data/Access Controls.mdx
+26-9Lines changed: 26 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,10 +10,22 @@ import { ReferenceLink } from '@site/docs/components/_nanos.mdx';
10
10
11
11
Access control is a selective restriction of access to data. <br />
12
12
13
-
Basic explanation of each control measure:
13
+
Access controls are a way of identifying someone is who they say they are are and what information or data they are allowed to access and use within a company setting. <br />
14
+
15
+
` - ` A security approach that governs who has access to, and can make use of certain resources <br />
16
+
` - ` It also assists a business to reduce risk when it comes to handling sensitive data <br />
17
+
18
+
Access controls can determine which services a user can access, such as: <br />
19
+
` - ` Email <br />
20
+
` - ` Software <br />
21
+
` - ` Internet <br />
22
+
` - ` Documents <br />
23
+
` - ` Admin access <br />
24
+
25
+
Explanation of each control measure:
14
26
15
27
### Physical Access
16
-
You need something physical to get in. <br />
28
+
You need something physical to get in. Physical protection systems are used to limit, or allow access to a specific area or strucure <br />
17
29
18
30
#### Pros
19
31
` - ` Need something physical to get in, no risk of writing passwords down
@@ -28,7 +40,8 @@ You need something physical to get in. <br />
28
40
:::
29
41
30
42
### Remote access
31
-
Being able to access a computer system from anywhere in the world, from any device.
43
+
44
+
Remote access control monitors and controls access to a computer or network anywhere and anytime.
32
45
33
46
#### Pros
34
47
` - ` Allows you to work from anywhere and pick up where you left off
@@ -37,14 +50,16 @@ Being able to access a computer system from anywhere in the world, from any devi
37
50
` - ` Though hard to do so, connection could get intercepted eventually
38
51
39
52
:::tip Examples
40
-
` - ` VPN <br />
41
-
` - ` VCN <br />
42
-
` - ` RDP <br />
53
+
` - ` VPN - **Virtual Private Network** - It allows people who work remotely, from home, to router their traffic securely through an online server that connects them to their company's network. <br />
54
+
` - ` VCN - **Virtual Computer Network** - Allows screen sharing to view and control the desktop of another comuter. This is usually carried out by using a VCN <br />
55
+
` - ` RDP - **Remote Desktop Protocol** - A Microsoft protocol used to achieve a remote connection, but there are also versions for other operating systems <br />
56
+
` - ` Internet Proxy Server - This provides a connection outside of a network or firewall. This is helpful when it comes to creating external connections <br />
43
57
:::
44
58
45
59
### Permissions
46
-
This is where certain users have certain permissions, such as `edit`, `view`, etc. <br />
47
-
Setting up permissions based accounts ensures that the correct people have access to the correct things they need to complete their job.
60
+
These are a set of rules that determine who has access to what parts of the system. <br />
61
+
62
+
Permissios allow you to establish positions in your network, assign them to specific indiciduals or groups to allow them to do or view certain things <br />
48
63
49
64
#### Pros
50
65
` - ` People are only able to do what they need to do. No risk of them doing something unauthourised
@@ -60,7 +75,9 @@ Setting up permissions based accounts ensures that the correct people have acces
60
75
:::
61
76
62
77
### Authentication
63
-
Ensure users are who they say they are. This is an added level of security to ensure the identity of the accesser.
78
+
This is a process where a system verifies te identity of a user who wishes to access the system, confirming that someone is who they claim to be <br />
79
+
80
+
The simplest form of this is the username and password method. This is a poor method. Stronger methods are required, and that is called `Multi-Factor Authentication` <br />
Copy file name to clipboardExpand all lines: Website/docs/digitalsupportnotes/Data/api.mdx
+40-14Lines changed: 40 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,13 +10,15 @@ import { ReferenceLink } from '@site/docs/components/_nanos.mdx';
10
10
11
11
API stands for `Application Programming Interface`. It allows two applications to talk to each other. <br />
12
12
13
+
APIs are needed to help applications better communicate with each other and make tasks for us simpler to understand. It also helps with productivity. <br />
14
+
15
+
Across the internet, many websites and apps can integrate with third-party providers and this is achieved by using an Application Programming Interface. <br />
16
+
17
+
APIs make sharing knowledge on the internet simpler for companies and communities. They are used by Facebook, Twitter, Youtube and other websites to connect their services. - APIs are not visible to the end user <br />
13
18
14
-
An example of an API is when you send a message on Facebook, Instagram or Whatsapp. <br />
15
-
Services like Zapier can handle API for you, making it easier for the end user. <br />
16
19
17
-
APIs are needed to help applications better communicate with each other and make tasks for us simpler to understand. It also helps with productivity. <br />
18
20
19
-
###Examples
21
+
## Examples
20
22
Some common API examples include: <br />
21
23
` - ` Paying using your phone <br />
22
24
` - ` Google maps <br />
@@ -25,21 +27,45 @@ Some common API examples include: <br />
The service is separated from the backend and the API will work wether it is communicating directly with a server. <br />
30
+
## Types
32
31
32
+
### Open APIs
33
33
34
+
Also known as Public APIs <br />
35
+
Developers can openly use Open APIs <br />
36
+
They may require registration or an API key, or they may be free. - In order to gain access to data or facilieies, they focus on external users. <br />
34
37
35
-
**SOAP** <br />
36
-
Simple Object Access Protocol <br />
37
-
Able to operate over a range of communication protocols, such as HTTP, SMTP, TCP and more. <br />
38
-
It is also extensible and style-independent, which allows developers to write SOAP APIs in various ways and easily add features and functionality. <br />
38
+
### Partner APIs
39
+
40
+
Not accessible to the general public and need special authorisation <br />
41
+
These are most visible and they are used to interact outside a comapny's borders <br />
42
+
43
+
### Internal APIs
39
44
45
+
Also known as private APIs <br />
46
+
Accessible by only internal systems and are shielded from external users <br />
40
47
48
+
### Composite APIs
49
+
50
+
These combine multiple data or service APIs into one <br />
51
+
Developers may us hem to make a single call to multiple endpoints <br />
52
+
53
+
## Protocols
54
+
55
+
When an API makes a call, a protocol defines the rules. It defines the data types and commands that are appropriate <br />
56
+
57
+
### REST <br />
58
+
Representational State Transfer <br />
59
+
This is a web services API <br />
60
+
Modern web applications such as Netflix, Uber, Amazon and other depend heavily on REST APIs <br />
61
+
62
+
### SOAP <br />
63
+
Simple Object Access Protocol <br />
64
+
This is a well known protocol, that is also a web API <br />
65
+
SOAP was the first protocol to standardise how applications could handle resources over network connections <br />
41
66
42
-
**RPC** <br />
67
+
### RPC <br />
43
68
Remote Procedural Call <br />
44
-
Earliest and simplest form of API. It's about executing a block of code from another serverand when implemented in HTTP it can become a Web API. <br />
69
+
This was the earliest and most basic in APIs <br />
70
+
It's aim was to allow a client to run code on a server <br />
0 commit comments