Sei sulla pagina 1di 3

XML Extensible Mark-up Language

XML is a mark-up language that defines a set of rules to encode documents in a


format which is both human and machine readable, with the main design to
describe data. The language has been designed to emphasize the simplicity,
generality and usability across the internet, as a textual data format with strong
support from Unicode for different human languages. Along with the focus on
documents, the XML design is widely used for the representation of arbitrary data
structures, i.e. those used in web services.
Similar to HTML, XML includes mark-up symbols to describe the page/file
contents. XML is known to be self-defining. The structure of the data is embedded
with the data so that when the data arrives it is understood within XML, thus
eliminating the need to pre-build the structure to store the data. The format of
XML can be used by any individuals or companies that wish to share information
in a consistent way.
The main part of an XML document is an element that is defined by tags. An
element holds a beginning and an ending tag. All elements will be contained in an
outermost element, called the root element. XML also supports nest elements, i.e.
an element within an element, giving it the ability to support hierarchical
structures. Similarly the XML Data Source control is typically used to display
hierarchal XML data in read-only scenarios. The XML Data Source control is a data
source control that presents XML data to data-bound controls, used to display
both hierarchal and tabular data i.e. transforming one XML data set into another.
The main benefit of XML is its simplicity, the ability to take a considerable amount
of information and consolidate it into an XML document, providing structure and
organisation to the information.
The XML standard is a trouble-free way to produce information formats and to
electronically share structured data through the internet and corporate networks.
(W3schools)
(Rouse, 2014)
Example of XML:
XML file for
<?xml version="1.0"?>
<?xml-stylesheet href="catalog.xsl" type="text/xsl"?>
<!DOCTYPE catalog SYSTEM "catalog.dtd">
<catalog>
<product description="Cardigan Sweater" product_image="cardigan.jpg">
<catalog_item gender="Men's">
<item_number>QWZ5671</item_number>
<price>39.95</price>
<size description="Medium">
<color_swatch image="red_cardigan.jpg">Red</color_swatch>
<color_swatch
image="burgundy_cardigan.jpg">Burgundy</color_swatch>
</size>
<size description="Large">
<color_swatch image="red_cardigan.jpg">Red</color_swatch>
<color_swatch
image="burgundy_cardigan.jpg">Burgundy</color_swatch>
</size>
</catalog_item>

<catalog_item gender="Women's">
<item_number>RRX9856</item_number>
<price>42.50</price>
<size description="Small">
<color_swatch image="red_cardigan.jpg">Red</color_swatch>
<color_swatch image="navy_cardigan.jpg">Navy</color_swatch>
<color_swatch
image="burgundy_cardigan.jpg">Burgundy</color_swatch>
</size>
<size description="Medium">
<color_swatch image="red_cardigan.jpg">Red</color_swatch>
<color_swatch image="navy_cardigan.jpg">Navy</color_swatch>
<color_swatch
image="burgundy_cardigan.jpg">Burgundy</color_swatch>
<color_swatch image="black_cardigan.jpg">Black</color_swatch>
</size>
<size description="Large">
<color_swatch image="navy_cardigan.jpg">Navy</color_swatch>
<color_swatch image="black_cardigan.jpg">Black</color_swatch>
</size>
<size description="Extra Large">
<color_swatch
image="burgundy_cardigan.jpg">Burgundy</color_swatch>
<color_swatch image="black_cardigan.jpg">Black</color_swatch>
</size>
</catalog_item>
</product>
</catalog>
(Barry)

Information Security Management (ISM)


Information Security describes the activities related to the protection of
information and information infrastructure assets against the risks of loss, misuse,
disclosure or damage. The two main components of ISM are Risk Management
and Risk Assessment. Information Security Management refers to the practise of
collecting, monitoring and analysing security related data from computer logs, the
Information Security Management System automates them into practise.
Information Security Management Systems has been introduced as a systematic
approach to managing sensitive company information to ensure it remaining
secure. Including people, processes and IT systems by applying risk management
processes.
The development of an Information Security Management System framework:
1.
2.
3.
4.
5.
6.

Definition of security policy.


Definition of ISMS scope.
Risk assessment.
Risk management
Selection of appropriate controls
Statement of applicability.

The definition of security policy refers to what it means to be secure for a system.
Defining the ISMS scope is to define which information you intend to protect, with
no regard for its location. The scope covers the responsibility for protecting the
information outlines no matter where, how and by whom this information is
accessed by.
The risk assessment and risk management process is the core part of the
Information Security Management Systems, as they are the processes that
transform the rules and guidelines of the security policy and the targets, and also
the objectives of ISMS into specific plans for the control and mechanism
implementation.
The selection of appropriate controls and statement of applicability dont concern
information risks specifically. They are more so related to the operative actions
that are required for the technical implementation, maintenance and control of
security measures.
(Kosutic, 2014)

Works Cited
Barry, D. K. (n.d.). Complex Data. Retrieved 01 19, 2015, from Service Architecture:
http://www.service-architecture.com/articles/object-oriented-databases/complex_data.html
Kosutic, D. (2014, 10 15). How to define the ISMS Scope. Retrieved 01 19, 2015, from
ISO27001standard: http://www.iso27001standard.com/blog/2014/10/13/how-to-define-theisms-scope/
Rouse, M. (2014, 12). XML (Extensible Markup Language). Retrieved 01 19, 2015, from
SearchSoa.techtarget: http://searchsoa.techtarget.com/definition/XML
W3schools. (n.d.). XML Tutorial. Retrieved 01 19, 2015, from w3schools.co:
http://www.w3schools.com/xml/

Potrebbero piacerti anche