Understanding the Security Challenges in JavaStop

Web-enabling JavaStop requires that you understand the accompanying security threats and the options available. Let us revisit the application design of JavaStop. We are planning to use a three-tiered application design:

  • A thin client

  • A Web server

  • A database server

The thin client connects to a Web server; the Web server connects to the database. The typical computer hacker is a very well-organized individual. Hackers do not really pursue nine-to-five jobs, and they even have conferences they attend at which they learn how to better themselves at their job—hacking into your system. Several types of tools are used by computer hackers that enable them to guess passwords, read network packets, and ...

Get e-Commerce Applications Using Oracle8i and Java from Scratch now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.