**1. Introduction**

18 Security Enhanced Applications for Information Systems

Jesse James Garrett (Feb 2005). Ajax: A New Approach to Web Applications. Available from http://adaptivepath.com/ideas/ajax-new-approach-web-applications Raducanu Razvan & Moisuc Maria (2010). The security of Web 2.0 and digital economy.

D. Crockford (July 2006). The application/json Media Type for JavaScript Object Notation

Anley C. Advanced SQL Injection in SQL Server Applications. *Next Generation Security* 

Halfond W G ; Viegas J and Orso A (2006). A classification of SQL-injection attacks and

Renzo Angles, Claudio Gutierrez. Survey of graph database models. *Journal ACM Computing* 

*BIOLOGY & CHEMISTRY*. pp.168-170, ISSN: 1790-2769

(JSON). *RFC 4627*, July 2006

*Software Ltd*. 2002.

*Engineering*, Mar. 2006

*Surveys*, Volume 40 Issue 1, February 2008

*Recent Advances in MATHEMATICS and COMPUTERS in BUSINESS, ECONOMICS,* 

countermeasures. *Proceedings of the IEEE International Symposium on Secure Software* 

**7. References** 

Prior to HTML, browsers, and the WWW, computer interconnections were localized and limited. Since the early 1990s, web technologies have made it easy for everyone to access and post content on the Internet. Before long, there were thousands, then hundreds of thousands, and soon tens of millions of computers, all connected together via the Internet. As noted by Robert Metcalfe, and as later codified in what became known as "Metcalfe's Law", the value of a network goes up as the square of the number of users. Regardless of whether we accept his exact quantification of the value, there is no question that a few interconnected computers are more valuable than the same computers not being interconnected, and that many (or all) computers being interconnected has much more value than only a portion of them.

This is the situation today: essentially all desktop, notebook, netbook and tablet computers are interconnected via the Internet, and the same is true for the majority of cell phones. Additionally, even a significant portion of embedded computers are being connected via the Internet, as well as most industrial control and monitoring computers. Suffice it to say that, if the trend continues, and the evidence is very strong that it will, most computers, mobile devices, and even embedded systems either are or soon will be connected via the Internet.

While this has dramatic advantages for a free and open society, there has always been an element of society that would attempt to take advantage of this openness in ways that are damaging to other computers, users, the data, or to society as a whole. The need to protect our computers, users, data, and society, from this type of abuse, is the field of information assurance and security.
