Abstract and keywords
Abstract (English):
This article examines the main approaches and methods for designing a secure authorization system for applications that involve the processing and analysis of sensitive information. The primary focus is on designing a secure authorization system based on JWT for an application that predicts the likelihood of various events. The principles of JWT operation, its advantages and vulnerabilities, as well as recommendations for its secure integration into the system, are discussed. Methods for protecting tokens from forgery, key rotation, the use of cryptographic algorithms, and the implementation of multi-factor authentication to enhance security are also considered.

Keywords:
data security, authorization system, JSON Web Token (JWT), event prediction, data protection, cryptography, cybersecurity, access tokens
References

1. Oficial'nyy sayt tehnologii JWT. – URL: https://jwt.io/.

2. RFC 7519. JSON Web Token (JWT). – URL: https://tools.ietf.org/html/rfc7519.

3. Rihter, Dzh. CLR via C#. Programmirovanie na platforme Microsoft .NET Framework 4.5 na yazyke C# / Dzh. Rihter. – SPb.: Piter, 2019. – 896 c.

4. Bederdinova, O. I. Programmirovanie na yazykah vysokogo urovnya : ucheb. posobie / O. I. Bederdinova, T. A. Mineeva, Yu. A. Vodovozova. – Moskva : INFRA-M, 2019.– 159 s. – URL: https://znanium.com/catalog/product/1044396. – Rezhim dostupa: po podpiske. EDN: https://elibrary.ru/AELIMF

5. Lerman, J. Programming Entity Framework: Code First/ J. Lerman, R. Miller; O’Reilly Media, Inc, 2011. – 177 p. – ISBN 978-1449312947.

Login or Create
* Forgot password?