Skip to content

Commit 07289bb

Browse files
authored
Merge pull request #109 from PatelN123/pageupdates
Page Updates
2 parents 7e8554d + 218d088 commit 07289bb

File tree

2 files changed

+66
-23
lines changed

2 files changed

+66
-23
lines changed

Website/docs/digitalsupportnotes/Data/Access Controls.mdx

Lines changed: 26 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -10,10 +10,22 @@ import { ReferenceLink } from '@site/docs/components/_nanos.mdx';
1010

1111
Access control is a selective restriction of access to data. <br />
1212

13-
Basic explanation of each control measure:
13+
Access controls are a way of identifying someone is who they say they are are and what information or data they are allowed to access and use within a company setting. <br />
14+
15+
` - ` A security approach that governs who has access to, and can make use of certain resources <br />
16+
` - ` It also assists a business to reduce risk when it comes to handling sensitive data <br />
17+
18+
Access controls can determine which services a user can access, such as: <br />
19+
` - ` Email <br />
20+
` - ` Software <br />
21+
` - ` Internet <br />
22+
` - ` Documents <br />
23+
` - ` Admin access <br />
24+
25+
Explanation of each control measure:
1426

1527
### Physical Access
16-
You need something physical to get in. <br />
28+
You need something physical to get in. Physical protection systems are used to limit, or allow access to a specific area or strucure <br />
1729

1830
#### Pros
1931
` - ` Need something physical to get in, no risk of writing passwords down
@@ -28,7 +40,8 @@ You need something physical to get in. <br />
2840
:::
2941

3042
### Remote access
31-
Being able to access a computer system from anywhere in the world, from any device.
43+
44+
Remote access control monitors and controls access to a computer or network anywhere and anytime.
3245

3346
#### Pros
3447
` - ` Allows you to work from anywhere and pick up where you left off
@@ -37,14 +50,16 @@ Being able to access a computer system from anywhere in the world, from any devi
3750
` - ` Though hard to do so, connection could get intercepted eventually
3851

3952
:::tip Examples
40-
` - ` VPN <br />
41-
` - ` VCN <br />
42-
` - ` RDP <br />
53+
` - ` VPN - **Virtual Private Network** - It allows people who work remotely, from home, to router their traffic securely through an online server that connects them to their company's network. <br />
54+
` - ` VCN - **Virtual Computer Network** - Allows screen sharing to view and control the desktop of another comuter. This is usually carried out by using a VCN <br />
55+
` - ` RDP - **Remote Desktop Protocol** - A Microsoft protocol used to achieve a remote connection, but there are also versions for other operating systems <br />
56+
` - ` Internet Proxy Server - This provides a connection outside of a network or firewall. This is helpful when it comes to creating external connections <br />
4357
:::
4458

4559
### Permissions
46-
This is where certain users have certain permissions, such as `edit`, `view`, etc. <br />
47-
Setting up permissions based accounts ensures that the correct people have access to the correct things they need to complete their job.
60+
These are a set of rules that determine who has access to what parts of the system. <br />
61+
62+
Permissios allow you to establish positions in your network, assign them to specific indiciduals or groups to allow them to do or view certain things <br />
4863

4964
#### Pros
5065
` - ` People are only able to do what they need to do. No risk of them doing something unauthourised
@@ -60,7 +75,9 @@ Setting up permissions based accounts ensures that the correct people have acces
6075
:::
6176

6277
### Authentication
63-
Ensure users are who they say they are. This is an added level of security to ensure the identity of the accesser.
78+
This is a process where a system verifies te identity of a user who wishes to access the system, confirming that someone is who they claim to be <br />
79+
80+
The simplest form of this is the username and password method. This is a poor method. Stronger methods are required, and that is called `Multi-Factor Authentication` <br />
6481

6582
#### Pros
6683
` - ` Added level of security

Website/docs/digitalsupportnotes/Data/api.mdx

Lines changed: 40 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -10,13 +10,15 @@ import { ReferenceLink } from '@site/docs/components/_nanos.mdx';
1010

1111
API stands for `Application Programming Interface`. It allows two applications to talk to each other. <br />
1212

13+
APIs are needed to help applications better communicate with each other and make tasks for us simpler to understand. It also helps with productivity. <br />
14+
15+
Across the internet, many websites and apps can integrate with third-party providers and this is achieved by using an Application Programming Interface. <br />
16+
17+
APIs make sharing knowledge on the internet simpler for companies and communities. They are used by Facebook, Twitter, Youtube and other websites to connect their services. - APIs are not visible to the end user <br />
1318

14-
An example of an API is when you send a message on Facebook, Instagram or Whatsapp. <br />
15-
Services like Zapier can handle API for you, making it easier for the end user. <br />
1619

17-
APIs are needed to help applications better communicate with each other and make tasks for us simpler to understand. It also helps with productivity. <br />
1820

19-
### Examples
21+
## Examples
2022
Some common API examples include: <br />
2123
` - ` Paying using your phone <br />
2224
` - ` Google maps <br />
@@ -25,21 +27,45 @@ Some common API examples include: <br />
2527
` - ` Login using Google, Twitter, Facebook etc <br />
2628
` - ` Holiday planning site <br />
2729

28-
### Types
29-
**REST** <br />
30-
Representational State Transfer <br />
31-
The service is separated from the backend and the API will work wether it is communicating directly with a server. <br />
30+
## Types
3231

32+
### Open APIs
3333

34+
Also known as Public APIs <br />
35+
Developers can openly use Open APIs <br />
36+
They may require registration or an API key, or they may be free. - In order to gain access to data or facilieies, they focus on external users. <br />
3437

35-
**SOAP** <br />
36-
Simple Object Access Protocol <br />
37-
Able to operate over a range of communication protocols, such as HTTP, SMTP, TCP and more. <br />
38-
It is also extensible and style-independent, which allows developers to write SOAP APIs in various ways and easily add features and functionality. <br />
38+
### Partner APIs
39+
40+
Not accessible to the general public and need special authorisation <br />
41+
These are most visible and they are used to interact outside a comapny's borders <br />
42+
43+
### Internal APIs
3944

45+
Also known as private APIs <br />
46+
Accessible by only internal systems and are shielded from external users <br />
4047

48+
### Composite APIs
49+
50+
These combine multiple data or service APIs into one <br />
51+
Developers may us hem to make a single call to multiple endpoints <br />
52+
53+
## Protocols
54+
55+
When an API makes a call, a protocol defines the rules. It defines the data types and commands that are appropriate <br />
56+
57+
### REST <br />
58+
Representational State Transfer <br />
59+
This is a web services API <br />
60+
Modern web applications such as Netflix, Uber, Amazon and other depend heavily on REST APIs <br />
61+
62+
### SOAP <br />
63+
Simple Object Access Protocol <br />
64+
This is a well known protocol, that is also a web API <br />
65+
SOAP was the first protocol to standardise how applications could handle resources over network connections <br />
4166

42-
**RPC** <br />
67+
### RPC <br />
4368
Remote Procedural Call <br />
44-
Earliest and simplest form of API. It's about executing a block of code from another serverand when implemented in HTTP it can become a Web API. <br />
69+
This was the earliest and most basic in APIs <br />
70+
It's aim was to allow a client to run code on a server <br />
4571

0 commit comments

Comments
 (0)