TAILIEUCHUNG - Lecture Database Systems - Lecture 31

After completing this chapter, students will be able to: Advanced issues in application development, including performance tuning, performance benchmarks, database-application testing, and standardization. | CSC271 Database Systems Lecture # 31 Summary: Previous Lecture Remaining steps/activities in Physical database design methodology Monitoring and performance tuning Security Chapter 19 Database Security Data is a valuable resource that must be strictly controlled and managed, as with any corporate resource Part or all of the corporate data may have strategic importance and therefore needs to be kept secure and confidential Mechanisms that protect the database against intentional or accidental threats Database Security Security considerations do not only apply to the data held in a database: breaches of security may affect other parts of the system, which may in turn affect the database Database security encompasses Hardware Software People Data Database Security Database security involves measures to avoid: Theft and fraud Loss of confidentiality (secrecy) Loss of privacy Loss of integrity Loss of availability Database Security Threat Any situation or event, whether intentional or unintentional, that will adversely affect a system and consequently an organization Threats to Computer Systems Typical Multi-user Computer Environment Countermeasures: Computer-Based Controls Concerned with physical controls to administrative procedures and includes: Authorization Access controls Views Backup and recovery Integrity Encryption RAID technology Countermeasures: Computer-Based Controls Authorization The granting of a right or privilege that enables a subject to have legitimate access to a system or a system’s object Authentication A mechanism that determines whether a user is who he or she claims to be Countermeasures: Computer-Based Controls Access controls Based on the granting and revoking of privileges Privilege A privilege allows a user to create or access (that is read, write, or modify) some database object (such as a relation, view, and index) or to run certain DBMS utilities Approaches used by DBMS Discretionary Access Control (DAC) Mandatory Access Control (MAC) .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.