Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 Databases, Controls, and Security.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Systems Analysis and Design in a Changing World, Fourth Edition
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Cryptography and Network Security
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Chapter 12 Designing System Interfaces, Controls, and Security
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Systems Analysis and Design in a Changing World, 6th Edition
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Design Aspects. User Type the URL address on the cell phone or web browser Not required to login.
14 Systems Analysis and Design in a Changing World, Fourth Edition.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Security+ Guide to Network Security Fundamentals, Fourth Edition
Chapter 8 Web Security.
Chapter 19 Security.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Securing Information Systems
Chapter 19 Security Integrity Security Control –computer-based –non-computer-based PC security DBMS and Web security Risk Analysis Data protection and.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Objectives Discuss examples of system interfaces found in information systems Define system inputs and outputs based on the requirements models of the.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Secure connections.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
15 Chapter 15 Design System Interfaces, Controls, and Security Systems Analysis and Design in a Changing World, 5th Edition.
1 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Chapter 12 Designing Systems Interfaces, Controls, and Security.
Learning Aid Type Text Page 206 MGS GROUP C Svitlana Panasik.
Material being covered 3/9 Remainder of Text Chapter 6 (Q5, 6) Text Chapter 6A Material Posted 3/9 Midterm Information Introduction to Text Chapter 7.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Types of Electronic Infection
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
CSCI 3140 Module 6 – Database Security Theodore Chiasson Dalhousie University.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
IAD 2263: System Analysis and Design Chapter 7: Designing System Databases, Interfaces and Security.
Network and Internet Security Prepared by Dr. Lamiaa Elshenawy
Encryption protocols Monil Adhikari. What is SSL / TLS? Transport Layer Security protocol, ver 1.0 De facto standard for Internet security “The primary.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
14 Systems Analysis and Design in a Changing World, Fourth Edition.
Secure Socket Layer Protocol Dr. John P. Abraham Professor, UTRGV.
Copyright © Terry Felke-Morris Web Development & Design Foundations with HTML5 8 th Edition CHAPTER 12 KEY CONCEPTS 1 Copyright.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
UNIT 7 SEMINAR Unit 7 Chapter 9, plus Lab 13 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours: Tuesday.
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Cryptography and Network Security
Security Protocols in the Internet
Systems Design Chapter 6.
Systems Analysis and Design in a Changing World, 6th Edition
Unit 8 Network Security.
Electronic Payment Security Technologies
E-business and Network Security
Presentation transcript:

Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 Databases, Controls, and Security

Systems Analysis and Design in a Changing World, 6th Edition 2 Example Set of Tables With Primary Key and Foreign Key

Systems Analysis and Design in a Changing World, 6th Edition 3 Database and DBMS Components

Systems Analysis and Design in a Changing World, 6th Edition 4 Designing Data Base and System Controls Architecture Existing databases Integrity control – rejects invalid inputs, prevents unauthorized outputs, and protects data and programs against tampering Security controls – part of the operating system and network and tend to be less application specific.

Systems Analysis and Design in a Changing World, 6th Edition 5 Partitioning Database Schema Into Client Access Subsets

Systems Analysis and Design in a Changing World, 6th Edition 6 Architecture for RMO Replicated and Partitioned Database

Systems Analysis and Design in a Changing World, 6th Edition 7 Integrity and Security Controls

Systems Analysis and Design in a Changing World, 6th Edition 8 Integrity Controls Input Controls Value limit control Completeness control Data validation control Field combination control

Systems Analysis and Design in a Changing World, 6th Edition 9 Integrity Controls Cont. Access control Transaction logging Complex update control Output control Redundancy Backup Recovery

Systems Analysis and Design in a Changing World, 6th Edition 10 Integrity Controls To Prevent Fraud Fraud triangle – Opportunity, Motivation, and Rationalization must all exist for a fraud to occur

Systems Analysis and Design in a Changing World, 6th Edition 11 Integrity Controls To Prevent Fraud

Systems Analysis and Design in a Changing World, 6th Edition 12 Security Controls Access Controls

Systems Analysis and Design in a Changing World, 6th Edition 13 Security Controls Data Encryption Public key encryption – a form of asymmetric key encryption that uses a public key for encryption and a private key for decryption

Systems Analysis and Design in a Changing World, 6th Edition 14 Security Controls Digital Certificate Digital certificate -- an institution’s name and public key (plus other information, such as address, Web site URL, and validity date of the certificate) encrypted and certified by a third party Certifying authority -- a widely accepted issuer of digital certificates

Systems Analysis and Design in a Changing World, 6th Edition 15 Security Controls Secure Transactions Secure Sockets Layer (SSL) -- a standard set of methods and protocols that address authentication, authorization, privacy, and integrity Transport Layer Security (TLS) -- an Internet standard equivalent to SSL IP Security (IPSec) -- an Internet standard for secure transmission of low-level network packets Secure Hypertext Transport Protocol (HTTPS) -- an Internet standard for securely transmitting Web pages