Book Image

Serverless Web Applications with React and Firebase

By : Harmeet Singh, Mayur Tanna
Book Image

Serverless Web Applications with React and Firebase

By: Harmeet Singh, Mayur Tanna

Overview of this book

ReactJS is a wonderful framework for UI development. Firebase as a backend with React is a great choice as it is easy, powerful, and provides great developer experience. It removes a lot of boilerplate code from your app and allows you to focus on your app to get it out quickly to users. Firebase with React is also a good choice for Most Viable Product (MVP) development. This book provides more practical insights rather than just theoretical concepts and includes basic to advanced examples – from hello world to a real-time seat booking app and Helpdesk application This book will cover the essentials of Firebase and React.js and will take you on a fast-paced journey through building real-time applications with Firebase features such as Cloud Storage, Cloud Function, Hosting and the Realtime Database. We will learn how to secure our application by using Firebase authentication and database security rules. We will leverage the power of Redux to organize data in the front-end, since Redux attempts to make state mutations predictable by imposing certain restrictions on how and when updates can happen. Towards the end of the book you will have improved your React skills by realizing the potential of Firebase to create real-time serverless web applications.
Table of Contents (16 chapters)
Title Page
Copyright and Credits
Packt Upsell
Contributors
Preface
Free Chapter
1
Getting Started with Firebase and React
Index

Security risks and prevention


The databases are at the heart of any organization since they contain customers' data and confidential business data and hence they are targeted by hackers very often. There are some common threats identified over the last few years and they include these:

  • Unauthorized or unintended activity
  • Malware Infections
  • Physical damage to database servers
  • Data corruption due to invalid data
  • Performance Degradation

To prevent such risks, there are many protocols or security standards that need to be followed:

  1. Access Control: It includes Authentication and Authorization. All the database systems provide access control mechanisms such as authentication with username and password for authentication. At the same time, in some of the databases, it is not mandatory to set it and hence sometimes people don't enable it, leaving the database insecure. Similarly, in all databases, authorization mechanisms such as role-based security is provided to restrict the users to certain data or...