First Year Report on Technical Enablers Development

Total Page:16

File Type:pdf, Size:1020Kb

First Year Report on Technical Enablers Development Enabling Crowd - sourcing based privacy protection for smartphone applications, websites and Internet of Things deployment (Privacy Flag) GRANT AGREEMENT NO.653426 Privacy Flag Project Enabling Crowd - sourcing based privacy protection for smartphone applications, websites and Internet of Things deployments Grant Agreement No.653426 Topic: DS - 01 - 2014 (Privacy) Innovation Action Deliverable D 4 . 1 First year report on Technical enablers development Document Number: D 4.1 Contractual Date of Delivery: 3 0. 04 . 2016 Editor: CTI Work - package: WP4 Distribution / Type: Public (PU) / Report (R) Version: v 1.0 Total Number of Pages: 6 0 This deliverable has been written in the context of the Privacy Flag Horizon 2020 European research p roject, which is supported by the European Commission and the Swiss State Secretariat for Education, Research and Innovation. The opinions expressed and arguments employed do not engage the supporting parties. Deliverable D4.1 “ First ye ar report on Technical enablers development ” Enabling Crowd - sourcing based pri vacy protection for smartphone applications, websites and Internet of Things deployment (Privacy Flag) GRANT AGREEMENT N o .653426 Abstract Privacy Flag (PF) combines crowd sourcing, ICT technology and legal expertise to protect citizen privacy when visiting websites, using smart - phone applications, or living in a smart city leveraging user friendly solution s provided as a smart phone application, a web browser add - on and a public website. It will: 1. Develop a highly scalable privacy monitoring and protection solution with : - Crowd sourcing mechanisms to identify, monitor and assess privacy - related risks; - Privacy monitoring agents to identify suspicious activities and application s ; - Universal Privacy Risk Area Assessment Tool and methodology tailored to European nor ms on personal data protection; - Personal Data Valuation mechanism; - Privacy enablers against traffic monitoring and finger printing; - User friendly interface informing about the privacy risks when us ing an application or website. 2. Develop a gl obal knowledge database of identified privacy risks, together with online services to support companies and other stakeholders in becoming privacy - friendly, including: - In - depth privacy risk analytical tool and services; - Voluntary legally binding me chanism for companies located outside of Europe to align with and abide to European standards in terms of personal data protection; - Services for companies interested in being privacy friendly; - Labell ing and certification process. 3. Collaborate wi th standardization bodies and actively disseminate towards the public and specialized communities, such as ICT lawyers, policy makers and academics. Eleven ( - 11 - ) European partners, including SMEs and a large telco operator (OTE) , bring their complementary technical, legal, societal and business expertise; Privacy - Flag intends to establish strong links with standardization bodies and international fora and it also intends to assess and incorporate outcomes from over 20 related res earch projects. It will build and ensure long term sustainability and growth. Deliverable D4.1 “ First ye ar report on Technical enablers development ” 2 Enabling Crowd - sourcing based privacy protection for smartphone applications, websites and Internet of Things deployment (Privacy Flag) GRANT AGREEMENT N o .653426 Executive Summary This document presents the work under the Work Package (WP ) 4 – Technical Enablers. The a im of this WP is to research and develop the required technical enablers and tools for security and privacy that will provide protection mechanisms for users, contribute towards the improvement of privacy protection and risk detection through collective us er activities . These will help infuse privacy risk awareness as well as privacy risk detection knowledge to users in order to make them take a more active role in handling their own privacy. Section 1 describes the purpose of this document and a general d escription of WP4. Section 2 offers a brief introductory overview of the work package context. It identifies the most common and dangerous threats against user privacy. These are divided into three main categories: Cookies HTML5 threats General IP threats In addition, it provides a brief description of the most common and severe among these threats that will be encountered by the Privacy Flag platform . Moreover, in subsection 2.2 the most popular browser add - ons are presented along with a brief description. It also discusses the current limitations of the available solutions and the reason a new solution is needed. Section 3 presents the architecture design for the Privacy Flag web browser add - on. Additionally, it describes the functionality scenarios, as well as the two levels of evaluation (the automated and the integration of UPRAAM). Section 4 presents the architecture design for the Privacy Flag s martphone application. Moreover, functionality scenarios are described and the two levels of evaluation (the automated and the integration of UPRAAM). Section 5 offers a description of the Privacy Flag Automatic Analysis Tool (the distributed agents). Sect ion 6 provides the database and server implementation progress. It analyzes the procedure followed when setting up the server that will support the WP4 components , as well as a first design and implementation of the database. In section 7 the development o f the architecture and functionality for the website and backend management platform are described. It also describes the key features for assessment of the risk using the in - depth evaluation tools. Deliverable D4.1 “ First ye ar report on Technical enablers development ” 3 Enabling Crowd - sourcing based privacy protection for smartphone applications, websites and Internet of Things deployment (Privacy Flag) GRANT AGREEMENT N o .653426 Contributors First name Last name Partner E - mail S otiris Nikoletseas CTI [email protected] Vasileios Vlachos CTI [email protected] Stamatiou Ioannis CTI [email protected] Madhja Adelina CTI [email protected] Tsolovos Dimitrios CTI [email protected] Tzamalis Pantelis CTI [email protected] Vasileios Barekas Velti [email protected] Andreas Daskalopoulos Velti [email protected] Andreas Drakos Velti [email protected] Daniel Forster UL Daniel.Forster@rwth - aachen.de Nenad Gligoric DNET [email protected] Evangelos Sfakianakis OTE [email protected] Ioannis Chochliouros OTE [email protected] Deliverable D4.1 “ First ye ar report on Technical enablers development ” 4 Enabling Crowd - sourcing based privacy protection for smartphone applications, websites and Internet of Things deployment (Privacy Flag) GRANT AGREEMENT N o .653426 Glossary ACRONYMS MEANING AAT Automatic Analysis Tool ACT Allied Command Transformation AI Artificial Intelligence AIA Authority Information Access AJAX Asynchronous JavaScript and XML API Application Programing Interface ASP Active Server Pages BEAST Browser Exploit Against SSL/TLS B SD Berkeley Software Distribution CA Certificate Authority CBC Cipher Block Chaining CLI Command - Line Interface CMS Content Management System COM Component Object Model CSRF Cross - Site Request Forgery DA Distributed Agent DARPA Defense Advanced Research Projects Agency DNS Domain Name System DNT Do Not Track DOM Document Object Model EC European Commission ECMA European Computer Manufacturers Association EWS Early Wa rning System EU European Union GA Grand Agreement GPS Global Positioning System HPKP HTTP Public Key Pinning HSTS HTTP Strict Transport Security HTML HyperText Markup Language HTTP Hypertext Transfer Protocol HTTP D Hypertext Transfer Protocol Dae mon HTTPS Hypertext Transfer Protocol Secur e I2P Invisible Internet Project ICT Information and Communication Technologies ID Identifier IIS Internet Information Service IoT Internet of Things IP Internet Protocol ISP Internet Service Provider IT Information Technology JAP Java Anon Proxy JRE Java Runtime Environment JSON JavaScript Object Notation LSO Local Shared Object LTS Long term Support Deliverable D4.1 “ First ye ar report on Technical enablers development ” 5 Enabling Crowd - sourcing based privacy protection for smartphone applications, websites and Internet of Things deployment (Privacy Flag) GRANT AGREEMENT N o .653426 MA Monitoring Agent OLE Object Linking and Embedding OS Operating System OSN Online Social Network P3P Platform for Privacy Preferences Project PEWS Privacy Early Warning System PDF Portable Document Format PET Privacy Enhancing Technology PF Privacy Flag PFAAT Privacy Flag Automatic Analysis Tool PHP Hypertext Pre - processor PKP Public Key Pinning PRAAT Privacy Risk Area Assessment Tool QoS Quality of Service RFC Request For Comments RTC Real - Time Communications SDK Software Development Kit SHA Secure Hash Algorithm SME Small Medium Enterprise SMS Short Message Service SOCKS Socket Secure SQL Structured Query Language SSH Secure Shell SSL Secure Sockets Layer TCP Transmission Control Protocol TLS Transport Layer Security Tor The Onion Router UI User Interface UPRAA M Universal Privacy Risk Area Assessment Model UPRAAT Universal Privacy Risk Area Assessment Tool URL Uniform Resource Locator USEMP User Empowerment for Enhanced Online Presence UX User Experience VE Virtual Entity VM Virtual Machine VPN Virtual Private Network W3C World Wide Web Consortium WoT Web of Trust WP Work Package WWW World Wide Web XML Extensible Markup Language XSS Cross - Site Scripting
Recommended publications
  • Active Server Pages (ASP)
    Active Server Pages (ASP) Outline 11.1 Introduction 11.2 How Active Server Pages Work 11.3 Client-side Scripting versus Server-side Scripting 11.4 Using Personal Web Server or Internet Information Server 11.5 A Simple ASP Example 11.6 Server-side ActiveX Components 11.7 File System Objects 11.8 Session Tracking and Cookies 11.9 Accessing a Database from an Active Server Page 11.10 Case Study: A Product Catalog 11.1 Introduction • Active Server Pages (ASP) – Processed in response to client request – ASP file contains HTML and scripting code – VBScript de facto language for ASP scripting • Other languages can be used – JavaScript – .asp file extension – Microsoft-developed technology – Send dynamic Web content • HTML • DHTML • ActiveX controls • Client-side scripts • Java applets 11.2 How Active Server Pages Work • Client sends request – Server receives request and directs it to ASP – ASP processes, then returns result to client • HTTP request types – Request methods • GET – Gets (retrieves) information from server – Retrieve HTML document or image • POST – Posts (sends) data to server – Send info from HTML form » Client-entered data » Info to search Internet » Query for a database » Authentication info 11.2 How Active Server Pages Work (II) • Browsers often cache Web pages – Cache: save on disk – Typically do not cache POST response • Next POST request may not return same result • Client requests ASP file – Parsed (top to bottom) by ActiveX component asp.dll • ActiveX component: server-side ActiveX control that usually does not have GUI
    [Show full text]
  • The Web Never Forgets: Persistent Tracking Mechanisms in the Wild
    The Web Never Forgets: Persistent Tracking Mechanisms in the Wild Gunes Acar1, Christian Eubank2, Steven Englehardt2, Marc Juarez1 Arvind Narayanan2, Claudia Diaz1 1KU Leuven, ESAT/COSIC and iMinds, Leuven, Belgium {name.surname}@esat.kuleuven.be 2Princeton University {cge,ste,arvindn}@cs.princeton.edu ABSTRACT 1. INTRODUCTION We present the first large-scale studies of three advanced web tracking mechanisms — canvas fingerprinting, evercookies A 1999 New York Times article called cookies compre­ and use of “cookie syncing” in conjunction with evercookies. hensive privacy invaders and described them as “surveillance Canvas fingerprinting, a recently developed form of browser files that many marketers implant in the personal computers fingerprinting, has not previously been reported in the wild; of people.” Ten years later, the stealth and sophistication of our results show that over 5% of the top 100,000 websites tracking techniques had advanced to the point that Edward employ it. We then present the first automated study of Felten wrote “If You’re Going to Track Me, Please Use Cook­ evercookies and respawning and the discovery of a new ev­ ies” [18]. Indeed, online tracking has often been described ercookie vector, IndexedDB. Turning to cookie syncing, we as an “arms race” [47], and in this work we study the latest present novel techniques for detection and analysing ID flows advances in that race. and we quantify the amplification of privacy-intrusive track­ The tracking mechanisms we study are advanced in that ing practices due to cookie syncing. they are hard to control, hard to detect and resilient Our evaluation of the defensive techniques used by to blocking or removing.
    [Show full text]
  • Active Server Pages Architecture
    Active Server Pages Architecture Li Yi South Bank University Contents 1. Introduction ...................................................................................................................................... 2 1.1 Host-based databases ............................................................................................................... 2 1.2 Client/server databases ............................................................................................................ 2 1.3 Web databases........................................................................................................................... 3 2. Active Server Pages ........................................................................................................................ 5 2.1 ASP Components ...................................................................................................................... 6 2.2 ADO and Database................................................................................................................... 7 2.3 The steps of executing a query ............................................................................................. 11 3 ASP Attributes ................................................................................................................................ 12 References:.......................................................................................................................................... 13 1 1. Introduction The development of databases always comes
    [Show full text]
  • Implementing OGC Web Map Service Client Applications Using JSP, JSTL and XMLC
    Implementing OGC Web Map Service Client Applications Using JSP, JSTL and XMLC Hao Ding , Richard Pascoe & Neville Churcher Department of Computer Science University of Canterbury. Christchurch, New Zealand Phone: +64 3 364-2362 Fax: +64 3 364-2569 Email: [email protected] , {richard, neville}@cosc.canterbury.ac.nz Presented at SIRC 2002 – The 14th Annual Colloquium of the Spatial Information Research Centre University of Otago, Dunedin, New Zealand th December 3-5 2002 ABSTRACT Java technologies are widely used in web application development. In this paper are described three approaches to developing Java-based web applications and our experiences with applying each to the development of client that interact with servers implementing the OGC (Open GIS Consortium) Web Map Service (WMS) specification. Also described is the installation and configuration of open source software that implements the WMS specification. The paper is concluded with some preliminary insights into when one of the three approaches to WMS client implementation is more suited to another. Keywords and phrases: WMS, JSP, JSTL, XMLC, map layer, web map server 1.0 INTRODUCTION Of the many technologies, such as Common Gateway Interface (CGI), Active Server Pages (ASP), JavaServer Pages (JSP), that are used to develop web applications, three are of particular interest to the research presented here. These three technologies or approaches to developing clients that utilise web services are JavaServer Pages (JSP), JSP with the use of tags from the JSP Standard Tag Library (JSTL), and the eXtensible Markup Language Compiler (XMLC). JSP is a more convenient way to write Java servlets, and allows the insertion of Java code directly into static HTML (Hypertext Markup Language) pages.
    [Show full text]
  • Zeszyty T 13 2018 Tytulowa I Redakcyjna
    POLITECHNIKA KOSZALIŃSKA Zeszyty Naukowe Wydziału Elektroniki i Informatyki Nr 13 KOSZALIN 2018 Zeszyty Naukowe Wydziału Elektroniki i Informatyki Nr 13 ISSN 1897-7421 ISBN 978-83-7365-501-0 Przewodniczący Uczelnianej Rady Wydawniczej Zbigniew Danielewicz Przewodniczący Komitetu Redakcyjnego Aleksy Patryn Komitet Redakcyjny Krzysztof Bzdyra Walery Susłow Wiesław Madej Józef Drabarek Adam Słowik Strona internetowa https://weii.tu.koszalin.pl/nauka/zeszyty-naukowe Projekt okładki Tadeusz Walczak Skład, łamanie Maciej Bączek © Copyright by Wydawnictwo Uczelniane Politechniki Koszalińskiej Koszalin 2018 Wydawnictwo Uczelniane Politechniki Koszalińskiej 75-620 Koszalin, ul. Racławicka 15-17 Koszalin 2018, wyd. I, ark. wyd. 5,72, format B-5, nakład 100 egz. Druk: INTRO-DRUK, Koszalin Spis treści Damian Giebas, Rafał Wojszczyk ..................................................................................................................................................... 5 Zastosowanie wybranych reprezentacji graficznych do analizy aplikacji wielowątkowych Grzegorz Górski, Paweł Koziołko ...................................................................................................................................................... 27 Semantyczne ataki na aplikacje internetowe wykorzystujące język HTML i arkusze CSS Grzegorz Górski, Paweł Koziołko ..................................................................................................................................................... 37 Analiza skuteczności wybranych metod
    [Show full text]
  • Tool Support for Computer Role-Playing Game Programming: Foundations, Guidelines and Applications
    Tampereen teknillinen yliopisto. Julkaisu 1237 Tampere University of Technology. Publication 1237 Juha-Matti Vanhatupa Tool Support for Computer Role-Playing Game Programming: Foundations, Guidelines and Applications Thesis for the degree of Doctor of Science in Technology to be presented with due permission for public examination and criticism in Tietotalo Building, Auditorium TB222, at Tampere University of Technology, on the 17th of October 2014, at 12 noon. Tampereen teknillinen yliopisto - Tampere University of Technology Tampere 2014 ISBN 978-952-15-3341-9 (printed) ISBN 978-952-15-3393-8 (PDF) ISSN 1459-2045 Abstract Computer role-playing games (CRPGs) are a genre of computer games, which aim at providing similar player experience than their ancestors, paper-and- pen role-playing games. For a type of digital games, their evolution is already rather long, as the first ones were created in 1980s. Typically CRPGs em- phasize character development and to support this huge fantasy worlds and sophisticated storylines are also present. CRPG development has unique challenges, which derive from these typical features. Content creation is a continuous issue, since huge virtual worlds and long storylines must be filled with content. Personalization is also an important issue, because all fun of creating personalized character is lost if it has no effect into the game. Low starting threshold is important for successful game. It is becoming essential that the player can start playing quickly and she is not required to spent time waiting the installation to be completed. This can be achieved by web-based approach, since web-based games do not require installations.
    [Show full text]
  • Stuxnet : Analysis, Myths and Realities
    ACTUSÉCU 27 XMCO David Helan STUXNET : ANALYSIS, MYTHS AND REALITIES CONTENTS Stuxnet: complete two-part article on THE virus of 2010 Keyboard Layout: analysis of the MS10-073 vulnerability used by Stuxnet Current news: Top 10 hacking techniques, zero-day IE, Gsdays 2010, ProFTPD... Blogs, softwares and our favorite Tweets... This document is the property of XMCO Partners. Any reproduction is strictly prohibited. !!!!!!!!!!!!!!!!! [1] Are you concerned by IT security in your company? ACTU SÉCU 27 XMCO Partners is a consultancy whose business is IT security audits. Services: Intrusion tests Our experts in intrusion can test your networks, systems and web applications Use of OWASP, OSSTMM and CCWAPSS technologies Security audit Technical and organizational audit of the security of your Information System Best Practices ISO 27001, PCI DSS, Sarbanes-Oxley PCI DSS support Consulting and auditing for environments requiring PCI DSS Level 1 and 2 certification. CERT-XMCO: Vulnerability monitoring Personalized monitoring of vulnerabilities and the fixes affecting your Information System CERT-XMCO: Response to intrusion Detection and diagnosis of intrusion, collection of evidence, log examination, malware autopsy About XMCO Partners: Founded in 2002 by experts in security and managed by its founders, we work in the form of fixed-fee projects with a commitment to achieve results. Intrusion tests, security audits and vulnerability monitoring are the major areas in which our firm is developing. At the same time, we work with senior management on assignments providing support to heads of information- systems security, in drawing up master plans and in working on awareness-raising seminars with several large French accounts.
    [Show full text]
  • Developing an E-Commerce System Using Active Server Pages
    Developing an E-Commerce System Using Active Server Pages Robert W. Ingram Ross-Culverhouse Chair Culverhouse School of Accountancy University of Alabama Box 870220 Tuscaloosa, AL 35487 (205) 348-2907 [email protected] Dale L. Lunsford Assistant Professor Culverhouse School of Accountancy University of Alabama Box 870220 Tuscaloosa, AL 35487 (205) 348-5780 [email protected] August 2002 Developing an E-Commerce System Using Active Server Pages Abstract: This paper describes a case to illustrate analysis, design, and implementation issues involving a multi-tier e-commerce system. The case is designed for use in advanced accounting systems or systems analysis and design courses. The case involves analysis of a sales order system that will be implemented using a web interface and relational database, conceptual design of the system, and implementation of the system. A variety of tasks are involved in the case, but an instructor can select the tasks of relevance in a particular course. Key Words: E-commerce, systems analysis and design, systems development, security. Data Availability: All data and programs described are available from the authors. 1 Developing an E-Commerce System Using Active Server Pages I. Introduction Web-based applications are an important means of accessing business information. E-commerce represents an increasingly important part of the economy and is an obvious source of demand for web-based systems. In addition, companies may use the Internet for internal communications because of the ability of employees to access data from locations throughout the world. Companies like Oracle and SAP are increasingly focusing on the Web as a means of deploying their software products.
    [Show full text]
  • Tracking the Cookies a Quantitative Study on User Perceptions About Online Tracking
    Bachelor of Science in Computer Science Mars 2019 Tracking the cookies A quantitative study on user perceptions about online tracking. Christian Gribing Arlfors Simon Nilsson Faculty of Computing, Blekinge Institute of Technology, 371 79 Karlskrona, Sweden This thesis is submitted to the Faculty of Computing at Blekinge Institute of Technology in partial fulfilment of the requirements for the degree of Bachelor of Science in Computer Science. The thesis is equivalent to 20 weeks of full time studies. The authors declare that they are the sole authors of this thesis and that they have not used any sources other than those listed in the bibliography and identified as references. They further declare that they have not submitted this thesis at any other institution to obtain a degree. Contact Information: Author(s): Christian Gribing Arlfors E-mail: [email protected] Simon Nilsson E-mail: [email protected] University advisor: Fredrik Erlandsson Department of Computer Science Faculty of Computing Internet : www.bth.se Blekinge Institute of Technology Phone : +46 455 38 50 00 SE–371 79 Karlskrona, Sweden Fax : +46 455 38 50 57 Abstract Background. Cookies and third-party requests are partially implemented to en- hance user experience when traversing the web, without them the web browsing would be a tedious and repetitive task. However, their technology also enables com- panies to track users across the web to see which sites they visit, which items they buy and their overall browsing habits which can intrude on users privacy. Objectives. This thesis will present user perceptions and thoughts on the tracking that occurs on their most frequently visited websites.
    [Show full text]
  • On the Privacy Implications of Real Time Bidding
    On the Privacy Implications of Real Time Bidding A Dissertation Presented by Muhammad Ahmad Bashir to The Khoury College of Computer Sciences in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science Northeastern University Boston, Massachusetts August 2019 To my parents, Javed Hanif and Najia Javed for their unconditional support, love, and prayers. i Contents List of Figures v List of Tables viii Acknowledgmentsx Abstract of the Dissertation xi 1 Introduction1 1.1 Problem Statement..................................3 1.1.1 Information Sharing Through Cookie Matching...............3 1.1.2 Information Sharing Through Ad Exchanges During RTB Auctions....5 1.2 Contributions.....................................5 1.2.1 A Generic Methodology For Detecting Information Sharing Among A&A companies..................................6 1.2.2 Transparency & Compliance: An Analysis of the ads.txt Standard...7 1.2.3 Modeling User’s Digital Privacy Footprint..................9 1.3 Roadmap....................................... 10 2 Background and Definitions 11 2.1 Online Display Advertising.............................. 11 2.2 Targeted Advertising................................. 13 2.2.1 Online Tracking............................... 14 2.2.2 Retargeted Ads................................ 14 2.3 Real Time Bidding.................................. 14 2.3.1 Overview................................... 15 2.3.2 Cookie Matching............................... 16 2.3.3 Advertisement Served via RTB.......................
    [Show full text]
  • Web Based Applications, Tomcat and Servlets - Lab 3
    CMPUT 391 Database Management Systems Web based Applications, Tomcat and Servlets - Lab 3 - CMPUT 391 – Database Management Systems Department of Computing Science University of Alberta The Basic Web Server Lab 3 CMPUT 391 – Database Management Systems 2 Tomcat and Servlets CGI CGI – Common Gateway Interface Processing forms & Generating dynamic content (early solution ) Spawning an external program, pass the data from the HTML form to the program Limitation: An expensive process (Spawning an external program) Lab 3 CMPUT 391 – Database Management Systems 3 Tomcat and Servlets CGI: Illustration Browser Browser Browser Browser GET Response Form.cgi Web Server Web Server Web Server Web Server Spawn an Read environment external program variables Response Start form.cgi CGfoI rPmr.ocggria m CGI Program CGI Program CteGrIm Pinroagterasm time Lab 3 CMPUT 391 – Database Management Systems 4 Tomcat and Servlets ASP ASP – Active Server Pages Microsoft’s answers to CGI programming ASP page - a Web page with code embedded inside, interpreted by the Web server Using special HTML tags, VBScript/JavaScript code can be inserted Lab 3 CMPUT 391 – Database Management Systems 5 Tomcat and Servlets Servlets Java technology's answer to CGI programming A Java class handling forms on Java Web servers Applet -- a little piece of program (client side) Servlet -- a little piece of program (server side) A servlet can do everything that a CGI program can Running inside the JVM along with the Web server itself Lab 3 CMPUT 391 – Database Management
    [Show full text]
  • Computer Information Systems: Web Applications (CISW) 1
    Computer Information Systems: Web Applications (CISW) 1 CISW 24 Secure Web Server Programming in Python COMPUTER INFORMATION 3 Units (Degree Applicable) Lecture: 54 SYSTEMS: WEB Corequisite: CISW 24L Secure web programming to create user interfaces, extract information APPLICATIONS (CISW) and manage databases, manage files, format reports, and access web CISW 15 Web Site Development servers using Python programming language. Student must be enrolled in 3.5 Units (Degree Applicable, CSU) CISW 24L, a concurrent lab co-requisite. Lecture: 54 Lab: 27 CISW 24L Secure Web Server Programming in Python Laboratory Advisory: CISB 15 or CISB 16 0.5 Units (Degree Applicable) Lab: 27 Plan, develop, implement, publish, and maintain Web sites with a Corequisite: CISW 24 professional visual Web-authoring application, includes working with text and images, internal and external hyperlinks, image maps, tables, Laboratory for secure web programming to create user interfaces, extract Cascading Style Sheets (CSS), Web page content, Web forms, multimedia information and manage databases, manage files, format reports, and objects (Flash text, Flash buttons, sounds, and video), interactions and access web servers using Python programming language. Student must behaviors, and Web page templates. Principles of Web site structures, be enrolled in CISW 24, a concurrent lecture co-requisite. documentation, management, and maintenance will be discussed. CISW 31 Secure Web Server Programming in PHP CISW 17 HTML, CSS, and JavaScript Programming 3 Units (Degree Applicable) 3 Units (Degree Applicable, CSU) Lecture: 54 Lecture: 54 Corequisite: CISW 31L Advisory: CISB 11 Advisory: (CISN 34 and CISN 34L) or (CISW 24 and CISW 24L) Plan, program, implement, publish, and maintain web sites using Plan, install, and manage secure Apache Web servers using server Hypertext Markup Language version 5 (HTML5), Cascading Style Sheets side programming language like PHP (PHP: Hypertext Preprocessor) to version 3 (CSS3), and JavaScript.
    [Show full text]