In a multi-tier enterprise application . Which layer can implement security constraints so that the data and application's resources can be protected from hackers . What are the technologies which can implement these constraints . What can be done to implement security in UI's and Address bars.
Asked
Active
Viewed 45 times
-2
-
2I suggest reading https://docs.oracle.com/javaee/7/tutorial/security-intro001.htm – thatsIch Jan 02 '16 at 10:29
-
What if I wanted to implement security using Spring Application framework . – Usman_Enterprise_Developer Jan 03 '16 at 05:59
-
Then your question is missing the spring tag or any indication that you are using Spring – thatsIch Jan 03 '16 at 13:07
1 Answers
1
A simple tip at first: Don't implement it on your own, but rely on proven frameworks doing it for you and learn to use them the right way.
Concerning the layer question: Your application can do many things to support security and it's always a good idea to think about the possible vulnerabilities and the harm that can be done with it. But usually, your application is not responsible for dealing with attacks - this should be done before the call even reaches your application. So in a productive environment, you have several security zones, for example a web server, an application server and a database, and all of them are protected by a firewall which control the possible access paths of your servers.

Alexander Rühl
- 6,769
- 9
- 53
- 96