Introduction
Apart from these functions, HTML may incorporate any program written in scripting languages such as Java or CSS by altering the behavior and layout of their content. HTML provides for the design and enhancement of checkboxes and buttons within a particular page. In Java, HTML is used to make the web pages interactive and dynamic by facilitating server-side scripts that easily connect to the database through online programs and video games. CSS on the other hand is cascading style sheet language that is used for describing the presentation present in the set visual style of webpage and user interfaces written in HTML. In other words, CSS is a tool used by HTML to link the specific file with the interface hence CSS is the backbone of the site.HTML is easy to understand and apply making it more flexible to design, modify and optimize. Additionally, HTML is supported in all browsers ranging from chrome all the way to Firefox and is also supported by various development tools such as Frontpage and Dreamweaver which simplifies programming. The web language is also search engine friendly as it creates SEO compliant websites hence easier to read and access and does not require any plug-ins or software. However, one needs to write a lot of code for making simple web pages and does not employ any security features (Gatrell, 2014).
Some of the new web technologies are the web components which are a unique style of elements for both HTML5 and DOM that allows for the creation of reusable widgets and components in web documents and applications. Web components aim at combining parts of software engineering with those of web design. This is signified by the fact that its model allows for the grouping together of data and operations that may alter the data as well as interact the system with the functions of other individual HTML elements. (Swiss, 2014).
Web components consist of custom elements, shadow DOM, HTML import, and HTML template. Custom elements allow the creation of elements that encapsulate the functionality of an HTML page rather than having to do long nested batches. On the other hand, shadow DOM removes the brittleness involved with the global nature of HTML and CSS. It fixes the problem by introducing scoped styles to the web platform. HTML template proves a way to create inner chunks of HTML that are stamped out for scripts to run.
Another vital and emerging web technology is the content management system(CMS). This is a computer application that allows the creation as well as the modification of digital content and supports the use of a collaborative environment that can be used by multiple users. CMS is web-based publishing, format management, and history editing that promotes the separation and preparation of the content within the particular site. Additionally, CMS is used for enterprise content management(ECM) whereby it collaborates with the workplace by integrating document management, records retention as well as digital asset management which provides the users with digital access to the organization.
Also, CMS also uses web content management(WCM) which facilitates the writing of websites collaboratively. Both ECM and WCM have content management applications which are the graphical user interface(GUI) that allows the user to control, create, modify and remove any content from a website without necessarily knowing anything about HTML. Above all, CMS is an intuitive, indexical, search and retrieval tool that allows its users to search by values such as keywords or author names. Apart from this, CMS contains revision features that enable content to be updated and edited even after its incipient publishing. Further, it comprises of publishing functionalities that enables individuals to use and set templates approved by any organization. CMS also provides the website with the ability to tailor its content and advertising to users' specific characteristics utilizing the user's information (Swiss, 2014).
Cybersecurity can be defined as the control and monitoring of physical access to hardware and software that may invade a computer system via network access, data, or code injection.
The need for a secure system is essential because of the increased dependency on computer systems, the internet, wireless networks such as wireless fidelity(WIFI), and also the progressive increase of smart devices. Enterprises, as well as large corporations, should keep their data well placed and organized for fast and easy retrieval. This place is usually the database where vital information is stored and secured from any malicious people. Databases not only contain files and documents, but they may also have critical information concerning the individuals in the company like their addresses, salaries, names and other confidential information like the username and password to their email addresses.
Critical issues that may need to be addressed is the giving away of a company to its employees' too many privileges and access to their database system. This leads to the abuse and altering of information to change data for personal gain. Apart from this, systems may become vulnerable due to SQL injections which is a structured query language that is domain-specific that enables the attacker to acquire admittance to a company's database. They are injected through poorly secured web applications and stored procedures. Other sources of vulnerabilities can be described as malware attacks whereby the attacker gains access to the database steals contents in the database and puts them back by use of malicious software that is designed to erase all the materials. Malware is planted by phishing whereby the attacker creates a passage through an email for the recipient to take the bait.
All these issues are countered by the use of query which allows the database administrator to enter rules and restrictions not to enter certain SQL operations when accessing the database network. Also, the use of intrusion prevention systems to identify faults in the accumulated procedures used to create the database is essential. The utilization of vulnerability assessment tools like data security software that check and recognize unwanted software hence preventing their installation is essential.
New and emerging security technology is being discovered every day through thorough research and study of malware. Malware as earlier discussed enters a system through Trojan horses(phishing), backdoors and logic bombs whereby they are disguised as essential application codes that need to be installed. Mostly these loopholes are left by the malicious developer during the writing of the code. This malware can be initiated by the developer or their associates from a remote location once the applications have been installed. The loopholes are accessible using secret codes that are only known to the attackers.
Telcordia's software visualization and analysis tool suite(TSVAT) helps to detect these codes by combining st...
Cite this page
Research Paper on Web Technologies. (2022, Mar 05). Retrieved from https://proessays.net/essays/research-paper-on-web-technologies
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Cyber Security Case Study: Brief Overview of Cybercrimes
- Security of Healthcare Records Essay
- Essay Example on Online Dating: A Growing Trend in Social Relationships
- Research Paper on HHS Investigation of BCBST Hard Drive Theft Reveals Data Breach
- Information Technology: Challenges and Improvements for a Global Community - Research Paper
- Essay on CRM: Leading Technology For Global Sales & Customer Relationships
- Waste Time on the Internet - Article Review Sample