Visual_Programming_Mid_Term_Notes
Visual_Programming_Mid_Term_Notes
Authentication is the process of verifying who a user is, such as using a username and password.
Authorization determines what that user is allowed to do after login, like viewing or editing data. Both
2. Configuring Security
This refers to setting up rules and protections in an application to prevent unauthorized access.
Examples include encryption, using secure communication channels (like HTTPS), and validating
user inputs.
CAS is a security model that restricts what managed code can do based on evidence like source
and identity. It prevents code from performing unauthorized tasks even if it runs on your system.
Code Groups classify code based on origin or evidence. Evidence includes location or digital
signature. Permissions are rights given to code. Role-Based Security assigns users roles and grants
permissions accordingly.
Principals represent security context; Identity is who the user is. DataReader reads data quickly,
forward-only. DataSet holds multiple tables in memory and works offline, suitable for GUI-based
apps.
XML is a structured format used for saving settings and data. Event Logs store application activities
BooleanSwitch is a simple true/false control for enabling features. TraceSwitch has levels like Error,
The Debug class helps developers print internal messages to understand what their code is doing
Trace class works like Debug but is used in production software to log messages, errors, and events
Listeners are tools that record messages (logs). Built-in listeners write to console or files. Custom
Listeners allow saving logs to custom formats like databases or external systems.