-2

In a multi-tier enterprise application . Which layer can implement security constraints so that the data and application's resources can be protected from hackers . What are the technologies which can implement these constraints . What can be done to implement security in UI's and Address bars.

1 Answers1

1

A simple tip at first: Don't implement it on your own, but rely on proven frameworks doing it for you and learn to use them the right way.

Concerning the layer question: Your application can do many things to support security and it's always a good idea to think about the possible vulnerabilities and the harm that can be done with it. But usually, your application is not responsible for dealing with attacks - this should be done before the call even reaches your application. So in a productive environment, you have several security zones, for example a web server, an application server and a database, and all of them are protected by a firewall which control the possible access paths of your servers.

Alexander Rühl
  • 6,769
  • 9
  • 53
  • 96