Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

Can data accessed through a web application really be secure? What if there is no Internet connection?

0
Posted

Can data accessed through a web application really be secure? What if there is no Internet connection?

0

Our systems ensure security through two means: • Password-protected logins: No one can access the system without having a username and password that is verified by the system every time a connection is made. • Role-based accounts: When a person logs in to the system, the system verifies that person’s role. Based on the role the person has been assigned, there are limits to the actions that can be performed and the data that can be accessed. Role-based access prevents non-authorized staff from viewing sensitive data such as salaries, performance issues and identification numbers. Even though the system uses a Web-based application, it does not require an Internet connection. It can be deployed on a local area network (LAN) that is limited to one office or on a wide area network (WAN) that may link several offices or districts together. This increases security even more, because the system is never accessible to the outside world. When the Capacity Project performs the infrastructure ass

0

Our systems ensure security through two means: • Password-protected logins: No one can access the system without having a username and password that is issued by a System Administrator and verified by the system every time a connection is made. • Role-based accounts: When a person logs in to the system, the system verifies that person’s role. Based on the role the person has been assigned, there are limits to the actions that can be performed and the data that can be accessed. Role-based access prevents non-authorized staff from viewing sensitive data such as salaries, performance issues, and identification numbers. Even though the system uses a Web-based application, it does not require an Internet connection. It can be deployed on a local area network (LAN) that is limited to one office or on a wide area network (WAN) that may link several offices or districts together. This increases security even more, because the system is never accessible to the outside world. When the CapacityPl

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123