I am working as a Java Developer, So every day we are
working on frent-end and back-end sides like Full Stack Developer, My day
starts with  daily standup meeting and
update status about assigned stories  and
what i am submiting to do on that day, Extensively worked with business
analysts and the end users to gather and finalize the requirements. Mostly I am
involved in developing Web based internet application to provide online
insurance services. And To develop online services we use Spring Boot, AWS, Webservices,
AngularJs, and for persistence operations we use Hibernate along with the
Spring MVC, as well as I involved on development of business to business
and  business to client level
Applications using 3tier,2 tier, and

n tier Architecture. When we complete the development of the
services we will test in local by using JUNIT test cases then we have peer
reviews with our tech leads and once that is done we will push our
administrations to Development condition and once the testing is done we will
move that to Integration with the assistance of Jenkins for continuous
improvement and this procedure will proceed until Production. we are used Used JIRA
tool for Issue/bug tracking, monitoring of work assignment in the
system. And Jboss is used as an Application Server to Deploy the Application. Monitoring
of work assignment in the project Stories in Agile Methodology and Used Eclipse
Luna as IDE to develop the application and followed the standard features for
debugging and running.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

 

The Subject Cryptography from I got  knowledge regarding the encryption and
decryption of information in developing of onile Applications, Encryption is
used in Insura claim reporting schemes to protect  transaction data like account numbers and
transaction amounts, Also is helps to When we connect our computer to the
Internet to browse for e-mail or login onto your favorite social network, that
connection is secured by TLS. The TLS protocol gives public key certificate
based authentication, and most important benfit is privacy with using
Cryptography like Protects the Application code and also communicate
Confidentially like passwords sent during a log on process and storing
confidential developing code in a database, Mostly it provide ensure data is
not visible or altered during storage and transmit from one compueter to onther
computer.

 

 

The other course Access control  uses computers to solve the limitations
of  locks and keys , for example if we
want to access any system we should know about credentials, so we using
credentials enables an individual access to 
computer-based information system,as well as credentials with random
unique serial numbers is recommended to counter this threat , so this process we
can  call multifactor authentication and used
Increases complexity of the computer, some time we getting Security risks like  natural disasters are the structure of the
building, down to the quality of the network and computer equipment vital,when
we developing the code the access control  is a part of the apparatus of achieving
encapsulation the goal of using establish a clear separation between interface
and implementation of developing code.