Hausarbeiten logo
Shop
Shop
Tutorials
En De
Shop
Tutorials
  • How to find your topic
  • How to research effectively
  • How to structure an academic paper
  • How to cite correctly
  • How to format in Word
Trends
FAQ
Zur Shop-Startseite › Informatik - IT-Security

IT Application Security and Control

Titel: IT Application Security and Control

Ausarbeitung , 2012 , 41 Seiten , Note: 98

Autor:in: Dileep Keshava Narayana (Autor:in)

Informatik - IT-Security

Leseprobe & Details   Blick ins Buch
Zusammenfassung Leseprobe Details

This work features the following topics: Steganography exercise, Digital Watermarking exercise, Churchill secondary school data protection report, Database Authentication, Database Authorization: Privileges and role based security, Database Authorization and data integrity (Views, Constraints), Implementing Virtual private database, Churchill secondary school database security policy, Database Security Policy and Database Security policy implementation.

Leseprobe


Inhaltsverzeichnis (Table of Contents)

  • Part 1
    • Weekly Assignment: Steganography exercise
    • Weekly Assignment: Digital Watermarking exercise
    • Churchill secondary school data protection report
    • Final Report
  • Part 2
    • Lab: Database Authentication
      • Overview
      • Exploring data dictionary
      • Creating a new user
      • Creating and using profile
    • Lab: Database Authorization: Privileges and role-based security
      • Overview
      • Connect as your original yoda user and create a new table.
      • Granting privileges to a new user.
      • Create a second user and grant necessary privileges.
      • Revoking privileges.
    • Lab: Database Authorization & Data integrity (views, constraints)
      • Implementing integrity constraints.
      • Creating views
    • Lab: Implementing Virtual private database
      • Investigate application context using SYS_CONTEXT function.
      • Create VPD that implement fine-grained access requirement: each doctor can see information only about his/her patients in the APPOINTMENT table.
      • Test your VPD as Nina Patel and as Walter Patterson.
    • Lab: Churchill secondary school database security policy
      • Database Security policy:
      • Database Security policy implementation: (profiles, roles, permissions, privileges, VPD, Views)
      • Final report: -

Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)

This coursework focuses on understanding and applying database security concepts to ensure data confidentiality, integrity, and availability in an organizational context. It explores practical implementations of security policies and techniques through various lab exercises, using the example of Churchill secondary school.

  • Database Security Policies and Implementation
  • Authentication and Authorization
  • Fine-grained Access Control using VPD and Views
  • Data Integrity and Constraint Management
  • Role-based Access Control

Zusammenfassung der Kapitel (Chapter Summaries)

  • Part 1: This section focuses on practical exercises related to steganography, digital watermarking, and data protection policies. It includes a detailed analysis of a proposed steganography method and suggests improvements for enhancing security. It also demonstrates how to implement a data protection report for a school, addressing key considerations like confidentiality and access rights for different staff roles.
  • Part 2: This section delves into database security, covering essential concepts like database authentication, authorization, and data integrity. It explores the use of data dictionary for user information, creating new user accounts, managing password policies, and assigning profiles. Furthermore, it demonstrates the practical implementation of privileges and roles for different users, including the creation of roles and assignment of permissions for specific tasks. The labs also cover implementing data integrity constraints using table creation and data manipulation. The final lab delves into virtual private databases (VPD) and how to implement fine-grained access control using VPD and application context. It explains the use of SYS_CONTEXT function to retrieve application context information and how to apply security policies for different user roles.

Schlüsselwörter (Keywords)

This coursework explores IT application security and control using real-world examples. It focuses on concepts such as database security, authentication, authorization, data integrity, VPD (Virtual Private Database), views, roles, privileges, and data protection. It examines the implementation of these concepts in a school environment, highlighting the importance of secure practices in educational settings.

Ende der Leseprobe aus 41 Seiten  - nach oben

Details

Titel
IT Application Security and Control
Hochschule
University of Greenwich  (University of Greenwich)
Veranstaltung
Network & Computer systems security
Note
98
Autor
Dileep Keshava Narayana (Autor:in)
Erscheinungsjahr
2012
Seiten
41
Katalognummer
V450383
ISBN (eBook)
9783668838604
ISBN (Buch)
9783668838611
Sprache
Englisch
Schlagworte
IT Application Security Control Computers
Produktsicherheit
GRIN Publishing GmbH
Arbeit zitieren
Dileep Keshava Narayana (Autor:in), 2012, IT Application Security and Control, München, GRIN Verlag, https://www.hausarbeiten.de/document/450383
Blick ins Buch
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
Leseprobe aus  41  Seiten
Hausarbeiten logo
  • Facebook
  • Instagram
  • TikTok
  • Shop
  • Tutorials
  • FAQ
  • Zahlung & Versand
  • Über uns
  • Contact
  • Datenschutz
  • AGB
  • Impressum