517 Securing web applications
Web applications must be designed and developed with security in mind to protect data, enforce trust, and prevent unauthorised access.
Outline
This section explores the core security mechanisms used to protect web applications. Students investigate how encryption, certificates, and secure protocols protect data in transit and at rest. They examine the roles of authentication, authorisation, and hashing in managing access and integrity, and learn how these technologies work together to create trusted digital systems.
These concepts connect closely with the security principles explored in earlier modules and prepare students for practical implementation in both front-end and back-end contexts.
Targets
In this topic, students learn to:
Explain how SSL certificates and encryption protect web communication
Distinguish between plain text and cipher text
Understand the use of encryption keys and algorithms
Apply authentication and authorisation principles to control access
Describe how hashing and digital signatures ensure data integrity
Glossary
Encryption
The process of converting plain text into unreadable cipher text to protect data
SSL/TLS
Security protocols that encrypt web traffic and verify server identity
Authentication
Verifying the identity of a user or system
Authorisation
Determining what actions a user or system is allowed to perform
Hash function
A one-way function that transforms data into a fixed-length value
Digital signature
A cryptographic tool that confirms data integrity and authenticity
Encryption key
A value used by an algorithm to encrypt or decrypt data
Plain text
Readable data before it is encrypted
Cipher text
Data that has been encrypted and is unreadable without the correct key
Overview
Security is a fundamental requirement of every web application. Users must be able to trust that their data is protected and that their interactions are private, verified, and safe. In this section, students explore the practical tools used to secure web applications—from cryptographic algorithms and secure connections to identity verification and access control.
Understanding these technologies is essential for developing full-stack applications that not only function well, but also protect users, data, and services from evolving threats.
Last updated
Was this helpful?