What Is An API, Anyway?

API is the acronym for Application Programming Interface, which is a software intermediary that allows two applications to talk to each other. Every time you use an app like Facebook, send an instant message, or check the weather on your phone, you’re using an API. 

Application programming interfaces, or APIs, simplify software development and innovation by enabling applications to exchange data and functionality easily and securely. 

Developers use APIs to enhance their products by accessing another company’s data, software, services, or code, thereby providing additional features while saving time and money.

When you use an application on your mobile phone, the application connects to the Internet and sends data to a server. The server then retrieves that data, interprets it, performs the necessary actions and sends it back to your phone. The application then interprets that data and presents you with the information you wanted in a readable way. 

Imagine you’re sitting in a restaurant with a menu of choices to order from. The kitchen is the part of the “system” that will prepare your order. What is missing is the critical link to communicate your order to the kitchen and deliver your food back to your table. That’s where the waiter or API comes in. The waiter is the messenger, or API, that takes your request or order and tells the kitchen, the system, what to do. Then the waiter delivers the response back to you - the food you ordered

Example Of An  API

You may be familiar with the process of searching flights online and you are presented a variety of options to choose from, including different cities, departure and return dates and more. Suppose that you are online booking you are flight on an airline website.

You choose a departure city and date, a return city and date, cabin class, as well as other variables. In order to book your flight, you interact with the airline’s website to access their database and see if any seats are available on those dates and what the costs might be. But what if you are not using the airline’s website - a channel that has direct access to the information? What if you are using an online travel service, such as Kayak or Expedia, which aggregates information from a number of airline databases?

The travel service, in this case, interacts with the airline’s API. The API is the interface that, like your helpful waiter, can be asked by that online travel service to get information from the airline’s database to book seats, baggage options and other requirements. The API then takes the airline’s response to your request and delivers it right back to the online travel service, which then shows you the most updated, relevant information.

An API Provides A Layer Of Security

Your online device's data is never fully exposed to the server, and likewise the server is never fully exposed to your device. Instead, each communicates with small packets of data, sharing only that which is necessary, like ordering from a takeout restaurant. You tell the restaurant what you would like to eat, they tell you what they need in return and when that is completed you get your meal.

How An API Works

An API is a set of defined rules that explain how computers or applications communicate with one another. APIs sit between an application and the web server, acting as an intermediary layer that processes data transfer between systems ands are designed for use by a computer or application, as follows: 

  •  A client application initiates an API call to retrieve information, also known as a request. This request is processed from an application to the web server via the API’s Uniform Resource Identifier (URI) and includes a request verb, headers, and sometimes, a request body.
  • After receiving a valid request, the API makes a call to the external program or web server. The server then sends a response to the API with the requested information.
  •  The API transfers the data to the initial requesting application.

While the data transfer will differ depending on the web service being used, this process of requests and response all happens through an API. 

APIs offer security by design because their position as middleman insures the integrity of the  functionality between two systems. The API endpoint separates the consuming application from the infrastructure providing the service. 

API calls usually include authorisation credentials to reduce the risk of attacks on the server, and an API gateway can limit access to minimise security threats. Also, during the exchange, HTTP headers, cookies, or query string parameters provide additional security layers to the data.

The Modern API

What an “API” is has evolved. Once often described any sort of generic connectivity interface to an application, the modern API has taken on some characteristics that make them extraordinarily useful:

  • Modern APIs adhere to standards (typically HTTP and REST), that are developer-friendly, easily accessible and understood broadly.
  • They are treated more like products than code. They are designed for consumption for specific audiences (e.g., mobile developers), they are documented, and they are versioned in a way that users can have certain expectations of its maintenance and lifecycle.
  • Because they are much more standardised, they have a much stronger discipline for security and governance, as well as monitored and managed for performance and scale.
  • Like any piece of productised software, the modern API has its own software development lifecycle (SDLC) of designing, testing, building, managing, and versioning for different uses and languages.  Furthermore, modern APIs are well documented for adaptation and versioning.

APIs have become so valuable that they comprise a large part of many business’ revenue and giant companies like Google, eBay, Salesforce.com, Amazon, and Expedia are among those businesses that make big money from APIs. 

IBM:      Hubspot:    MuleSoft:     APIMetrics:     OKTA:    Postman

You Might Also Read: 

Endpoint Security Is More Important Than Ever:

 

« Clearview Faces £17 Million Penalty For Breaching Data Laws
Dealing With Scam Emails »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSO

CSO

CSO serves enterprise security decision-makers and users with the critical information they need to stay ahead of evolving threats and defend against criminal cyberattacks.

Lookout

Lookout

Lookout is the data-centric cloud security company that uses a defense-in-depth strategy to address the different stages of a modern cybersecurity attack.

Maritime Cybersecurity Center (MCC)

Maritime Cybersecurity Center (MCC)

Maritime Cybersecurity Center is a not-for-profit organization focused on regional cybersecurity excellence and readiness, with a special emphasis on the maritime community.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Get Safe Online

Get Safe Online

Get Safe Online is a leading source of unbiased, factual and easy-to-understand information on online safety.

Bleam Cyber Security

Bleam Cyber Security

Bleam is a leading provider of Managed Cyber Security Services and Information Security consulting. We deliver enterprise class security services to UK SME’s to stop data breaches.

Redhorse

Redhorse

Redhorse provides top-tier consulting to help clients address mission-critical government problems in National Security, Networking Technology, Energy and the Environment.

Capital Network Solutions

Capital Network Solutions

Capital Network Solutions are a highly accredited managed IT services and consultancy provider, specialising in cyber security, infrastructure and communications.

Asimily

Asimily

Asimily’s IoMT risk remediation platform holistically secures the mission-critical healthcare devices that deliver safe and reliable care.

AI Spera

AI Spera

AI-Driven Cyber Threat Intelligence Security. AI Spera provides real-time intelligence to empower your security competences in all aspects of the business.

Skyhigh Security

Skyhigh Security

Skyhigh Security enables your remote workforce while addressing your cloud, web, data, and network security needs.

AdviserCyber

AdviserCyber

AdviserCyber provide Cybersecurity and Compliance Solutions for Registered Investment Advisers.

63 Moons Technologies (63MT)

63 Moons Technologies (63MT)

63 Moons Technologies is a world leader in providing next-generation technology ventures, innovations, platforms, and solutions.

DuckDuckGoose

DuckDuckGoose

DuckDuckGoose offer advanced solutions to protect against manipulated videos, images, voices and texts.

Abissi

Abissi

Abissi offer cyber intelligence, IoT security, automotive security, red teaming, application security and artificial intelligence security services, with a focus on security by design.

Network Coverage

Network Coverage

Network Coverage align, maintain, and integrate technology and cloud solutions with business operations to improve productivity and security with as few issues and disruptions as possible.