This work features the following topics: Steganography exercise, Digital Watermarking exercise, Churchill secondary school data protection report, Database Authentication, Database Authorization: Privileges and role based security, Database Authorization and data integrity (Views, Constraints), Implementing Virtual private database, Churchill secondary school database security policy, Database Security Policy and Database Security policy implementation.
Inhaltsverzeichnis (Table of Contents)
- Part 1
- Weekly Assignment: Steganography exercise
- Weekly Assignment: Digital Watermarking exercise
- Churchill secondary school data protection report
- Final Report
- Part 2
- Lab: Database Authentication
- Overview
- Exploring data dictionary
- Creating a new user
- Creating and using profile
- Lab: Database Authorization: Privileges and role-based security
- Overview
- Connect as your original yoda user and create a new table.
- Granting privileges to a new user.
- Create a second user and grant necessary privileges.
- Revoking privileges.
- Lab: Database Authorization & Data integrity (views, constraints)
- Implementing integrity constraints.
- Creating views
- Lab: Implementing Virtual private database
- Investigate application context using SYS_CONTEXT function.
- Create VPD that implement fine-grained access requirement: each doctor can see information only about his/her patients in the APPOINTMENT table.
- Test your VPD as Nina Patel and as Walter Patterson.
- Lab: Churchill secondary school database security policy
- Database Security policy:
- Database Security policy implementation: (profiles, roles, permissions, privileges, VPD, Views)
- Final report: -
- Lab: Database Authentication
Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)
This coursework focuses on understanding and applying database security concepts to ensure data confidentiality, integrity, and availability in an organizational context. It explores practical implementations of security policies and techniques through various lab exercises, using the example of Churchill secondary school.
- Database Security Policies and Implementation
- Authentication and Authorization
- Fine-grained Access Control using VPD and Views
- Data Integrity and Constraint Management
- Role-based Access Control
Zusammenfassung der Kapitel (Chapter Summaries)
- Part 1: This section focuses on practical exercises related to steganography, digital watermarking, and data protection policies. It includes a detailed analysis of a proposed steganography method and suggests improvements for enhancing security. It also demonstrates how to implement a data protection report for a school, addressing key considerations like confidentiality and access rights for different staff roles.
- Part 2: This section delves into database security, covering essential concepts like database authentication, authorization, and data integrity. It explores the use of data dictionary for user information, creating new user accounts, managing password policies, and assigning profiles. Furthermore, it demonstrates the practical implementation of privileges and roles for different users, including the creation of roles and assignment of permissions for specific tasks. The labs also cover implementing data integrity constraints using table creation and data manipulation. The final lab delves into virtual private databases (VPD) and how to implement fine-grained access control using VPD and application context. It explains the use of SYS_CONTEXT function to retrieve application context information and how to apply security policies for different user roles.
Schlüsselwörter (Keywords)
This coursework explores IT application security and control using real-world examples. It focuses on concepts such as database security, authentication, authorization, data integrity, VPD (Virtual Private Database), views, roles, privileges, and data protection. It examines the implementation of these concepts in a school environment, highlighting the importance of secure practices in educational settings.
- Quote paper
- Dileep Keshava Narayana (Author), 2012, IT Application Security and Control, Munich, GRIN Verlag, https://www.hausarbeiten.de/document/450383