0% found this document useful (0 votes)
46 views18 pages

MIS Final

Security in management information system Why it is needed? Causes of security problems Outside peoples and hackers People who work for your company applications Types of security threats Spoofing attack Categories of threats o o Reconnaissance Attacks Scanning Eavesdropping Access attack DOS attack 3 / 18 / 12 Malicious software that can harm any information systemVirus Worms Trojan horse Spyware Designing a security solution should meet these goals.

Uploaded by

Shivam Nagar
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views18 pages

MIS Final

Security in management information system Why it is needed? Causes of security problems Outside peoples and hackers People who work for your company applications Types of security threats Spoofing attack Categories of threats o o Reconnaissance Attacks Scanning Eavesdropping Access attack DOS attack 3 / 18 / 12 Malicious software that can harm any information systemVirus Worms Trojan horse Spyware Designing a security solution should meet these goals.

Uploaded by

Shivam Nagar
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Database Management & securities

Presented ByRahul Khajuria(115) Shivam Nagar (95)


3/18/12

Example of a Traditional Database Application


Suppose we are building a system to store the information about:

students courses professors who takes what, who teaches what


22

3/18/12

Enters a DBMS
Two tier system or client-server

connection (ODBC, JDBC)

Database server
Data files 3/18/12 Applications 33

Simplified database system environment

3/18/12

3/18/12

3/18/12

3/18/12

Backup and Recovery

Backup - The process of periodically taking a copy of the database and log file on to offline storage media. Journaling - The process of keeping and maintaining a log file (or journal) of all changes made to the database to enable recovery to be undertaken effectively in the event Click to edit Master subtitle style of a failure.

3/18/12

Encryption

Encryption - The encoding of the data by a special algorithm that renders the data unreadable by any program without the decryption key.
Plain-data Algorithm and Click to edit Master subtitle style password Encrypted data

3/18/12

Security in management information system


Why it is needed?

Causes of security problems

Outside peoples and hackers People who work for your company Applications

3/18/12

Types of security threats

3/18/12

Spoofing attack

3/18/12

Categories of threats
o o

Reconnaissance Attacks Scanning Eavesdropping Access attack DOS attack


3/18/12

Malwares

Malicious software that can harm any information systemVirus Worms Trojan horse Spyware

3/18/12

Planning for securityo o o o

Business goals and user needs Peoples and politics Technical issues Diverse platforms

3/18/12

Security goals
A good security solution should meet these goals:

A single cohesive security policy should be created, based on your company's business plan and goals. Security policies should dictate the choice of security solutions and products, not vice versa. Security management should be 3/18/12 centralized under a single umbrella.

Designing a security solution


Should be easy to implement should enable your company to develop and deploy new applications in your network should enable your company to use the Internet in a secure manner Antivirus as per requirement
3/18/12

3/18/12

You might also like