MIS Final
MIS Final
3/18/12
Enters a DBMS
Two tier system or client-server
Database server
Data files 3/18/12 Applications 33
3/18/12
3/18/12
3/18/12
3/18/12
Backup - The process of periodically taking a copy of the database and log file on to offline storage media. Journaling - The process of keeping and maintaining a log file (or journal) of all changes made to the database to enable recovery to be undertaken effectively in the event Click to edit Master subtitle style of a failure.
3/18/12
Encryption
Encryption - The encoding of the data by a special algorithm that renders the data unreadable by any program without the decryption key.
Plain-data Algorithm and Click to edit Master subtitle style password Encrypted data
3/18/12
Outside peoples and hackers People who work for your company Applications
3/18/12
3/18/12
Spoofing attack
3/18/12
Categories of threats
o o
Malwares
Malicious software that can harm any information systemVirus Worms Trojan horse Spyware
3/18/12
Business goals and user needs Peoples and politics Technical issues Diverse platforms
3/18/12
Security goals
A good security solution should meet these goals:
A single cohesive security policy should be created, based on your company's business plan and goals. Security policies should dictate the choice of security solutions and products, not vice versa. Security management should be 3/18/12 centralized under a single umbrella.
Should be easy to implement should enable your company to develop and deploy new applications in your network should enable your company to use the Internet in a secure manner Antivirus as per requirement
3/18/12
3/18/12