Why is it necessary to execute the application software?
Execution of application is necessary on the computer system or smartphone device because the application software after giving a running command to the program file then the program file runs on the environment of the operating system on the computer or smartphone device.
The execution of an application is possible through the execution file that accesses all the related files of the application software to display and run on the application software on the computer system.
The execution is a term that runs the file which is the main file and displays the home page of the application software after completing the execution process.
The execution of all types of files is necessary to run because every type of files can be used for service and execute all the files when the end user opens the file on the application software or any type of option to use its services.
The execution of a program in application software is to provide the output interface and response to the user through the display form of an application software.
The program is used to provide the form of taking input value that means the program is now running on the application software on the computer to show the response for taking some values to get the output data for the end user on the computer from the output resource.
Introduction to the computer system related topic and the topic is following below here:
Why is it necessary to execute the application software?
Let's discuss the computer system related topic is mentioned above and the explained following below here:
Why is it necessary to execute the application software?
There are some points on the computer system and application software development related to the topic of "Why is it necessary to execute the application software?" following below here:
- Execution of the system design model for providing interface of the application
- Execute the program for providing the service for end user
- Execute the database processing output to the output interface for user
- Security interface also execute to protect the user data on application
Let's discuss the points listed above about the computer system and application software development related to the topic of "Why is it necessary to execute the application software?" explanation following below here:
Execution of the system design model for providing interface of the application
Execution of the system design model for providing interface of the application software that means the interface is only displayed on the screen of the monitor output device of the computer system when the program file is executed and run on the operating system environment and executes the graphics files on the application software.
The interface is a design view of the operating system to provide the display form of the application software.
The file which is used to display the interface of the application also shows the forms of the service options and home page of the application to understand where the end user starts their task in the particular department on the computer system.
Execution of the system design model is to provide the interface of the application software to see the response back when the user takes an option to click on it and the program shows the output interface of the program after taking input value according to the program on the application software.
Execute the program for providing the service for end user
Execute the program for providing the service for the end user on the application software to display the design of form and the form is executed through the calling a program on the application software.
The file of the program is used to execute and run on the application software on the computer system is used to provide the input taking interface for the end user on the application software.
The execution of the program files is connected to the main file of application software which is used to run, execute and call the function with program file on the application software.
The program is used to run and provide the interface of input taking form and provide the output data on the output interface of the program which is running on the application software.
The executes when the end user takes an action on the application software through input resource on the application to click the option of the application then the program executes to show the response to the end user in the display form of design interface.
The program of application is activated when the user performs an event on the option designed for application software such as:- clicking on the button.
Execute the database processing output to the output interface for user
Executed the database processing output to the output interface for user that means the database file is used to process the data at backend system of the application software means the program data is saved but it is used to manage the data through the SQL programs and commands on the database file of the application software to process the data at backend of the application software.
Execute the output interface when the user sends some instructions and provide application software through the input hardware and to process it and give some post on the application software or computer system and smartphone devices.
Security interface also execute to protect the user data on application
Security interface also executes to protect the user data on the application software that means the security interface is used to protect the data when the user tries to open their account without the process of security layer then the user cannot access their account without verifying the username with the password data.
The security layer interface included basically username and password and button to open or login account which the user has been created on the application software database model file containing the database, record, tuple or row and their attribute, field, columns etc. the attribute is verified when the username and password recorded on the record of the relational database model for security system.
Example of security execution on the application software for the end user:-
Security execution on application software involves implementing measures that ensure the software operates securely, especially when an end user interacts with it. Here's an example of how security execution can be applied using a security model:
An online banking application that uses a Role-Based Access Control (RBAC) security model:-
Security Execution Example:
1. Authentication on the application software security model:
- Process:
The end user logs in with a username and password.
- Security Execution:
- The application uses multi-factor authentication (MFA) to ensure the user is who they claim to be.
- Passwords are hashed and salted before being stored in the database to protect against data breaches.
2. Authorization on the application:
-Process:
After logging in, the user tries to access various features of the application.
-Security Execution:
- The RBAC model restricts the user’s access based on their role (e.g., customer, teller, manager).
- A customer can view their account balance but cannot approve transactions for other customers, while a teller can view and manage multiple customer accounts within their branch.
3. Data Encryption of the end user:
- Process:
The user sends a request to transfer money to another account.
- Security Execution:
- The application encrypts the transaction data both in transit (using SSL/TLS) and at rest.
- This ensures that even if data is intercepted or accessed without authorization, it cannot be read or modified.
4. Input Validation from the end user:
- Process:
The user inputs the account number and amount for the transfer.
- Security Execution:
- The application validates the input to ensure it meets expected formats (e.g., account numbers must be numeric and of a certain length).
- This prevents injection attacks, such as SQL injection or cross-site scripting (XSS), that could exploit vulnerabilities in the application.
5. Logging and Monitoring by program of security model on application:
- Process:
The user successfully completes the transaction.
- Security Execution:
- The application logs the transaction details, including the user ID, timestamp, and transaction amount.
- These logs are monitored for unusual activity, such as repeated failed login attempts or large, unexpected transfers, which could indicate a security breach.
6. Session Management on application:
- Process:
The user remains logged into the application.
- Security Execution:
- The application manages sessions securely by issuing a session token after authentication.
- The token expires after a period of inactivity or after a certain time, requiring the user to log in again. This limits the risk of unauthorized access if the session is hijacked.
7. Error Handling on the application security model:
- Process:
The user enters an incorrect account number.
- Security Execution:
- The application provides a generic error message like "Invalid account number" without revealing sensitive information (e.g., "Account number not found in the database").
- This prevents attackers from gaining insights into the system's inner workings.
Outcome on the application software security model:-
By following this security execution strategy within the RBAC security model, the application ensures that:
- Only authorized users can access and perform actions.
- Sensitive data is protected from unauthorized access and tampering.
- The system is resilient against common security threats.
This ensures the security and integrity of both the application and the end user's data.
Comments
Post a Comment