1 Figure 9-10: Database and Instant Messaging Security Concerns Other Applications  There are many other applications  Each has its own security issues.

Slides:



Advertisements
Similar presentations
Informer Security PRESENTER: Tim Nicholson | | March 5-6, 2012.
Advertisements

File Server Organization and Best Practices IT Partners June, 02, 2010.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 5 Database Application Security Models.
IMPORT WIZARD Roudabeh Moraghebi CS491 Fall 2005.
MI807: Database Systems for Managers Introduction –Course Goals & Schedule –Logistics –Syllabus Review Relational DBMS Basics –RDBMS Role in Applications.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Chapter 5 Database Application Security Models
Databases and Connectivity MIS 497. Relational Databases Dominant database technology today. Dominant database technology today. Stores data in relational.
MD807: Relational Database Management Systems Introduction –Course Goals & Schedule –Logistics –Syllabus Review RDBMS Basics –RDBMS Role in Applications.
Working with SQL and PL/SQL/ Session 1 / 1 of 27 SQL Server Architecture.
1 Chapter Overview Transferring and Transforming Data Introducing Microsoft Data Transformation Services (DTS) Transferring and Transforming Data with.
Database Security Managing Users and Security Models.
1 Client/Server Database Tutorial. SQL Server Connection through MS Access FACBUSAD1 SQL server MS Access MGD B106 Computer or your own PC Remote SQL.
Overview What is SQL Server? Creating databases Administration Security Backup.
1 Application Security: Electronic Commerce and Chapter 9 Copyright 2003 Prentice-Hall.
Chapter 5 Database Processing.
A Guide to SQL, Eighth Edition Chapter Three Creating Tables.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
6-1 DATABASE FUNDAMENTALS Information is everywhere in an organization Information is stored in databases –Database – maintains information about various.
Analysis of SQL injection prevention using a proxy server By: David Rowe Supervisor: Barry Irwin.
1 Application Security: Electronic Commerce and Chapter 9 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall.
1 INTRODUCTION TO DATABASE MANAGEMENT SYSTEM L E C T U R E
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
Web Server Administration Chapter 7 Installing and Testing a Programming Environment.
Database Application Security Models Database Application Security Models 1.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Computer Science 101 Database Concepts. Database Collection of related data Models real world “universe” Reflects changes Specific purposes and audience.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Data Mining Instructor: Dr C. C. Chan. Remote Desktop  Go to  Start  All Programs  Accessories  Communications  Remote Desktop Connection  Give.
A PRIMER FOR KEEPING YOUR ENVIRONMENT IN SHAPE. SQL Server 2008 Policy Based Management By Scott Abrants.
Chapter 5 Database Processing. Neil uses software to query a database, but it has about 25 standard queries that don’t give him all he needs. He imports.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
M1G Introduction to Database Development 2. Creating a Database.
BY SATHISH SQL Basic. Introduction The language Structured English Query Language (SEQUEL) was developed by IBM Corporation, Inc., to use Codd's model.
INFO1408 Database Design Concepts Week 15: Introduction to Database Management Systems.
By Stephanie Wood And Nedziba Bubregovic.  A very large collection of data  A database management system is a software package designed to store and.
2. SQL Security Objectives –Learn SQL Server 2000 components Contents –Understanding the Authentication Process –Understanding the Authorization Process.
Ch. 101 Database Management An Introduction to Databases.
Database Management Supplement 1. 2 I. The Hierarchy of Data Database File (Entity, Table) Record (info for a specific entity, Row) Field (Attribute,
Module 6: Data Protection. Overview What does Data Protection include? Protecting data from unauthorized users and authorized users who are trying to.
Introduction to Databases Three File Processing Systems DAVID M. KROENKE’S DATABASE PROCESSING, 10th Edition © 2006 Pearson Prentice Hall 1-2.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Constraints Lesson 8. Skills Matrix Constraints Domain Integrity: A domain refers to a column in a table. Domain integrity includes data types, rules,
Data Mining Instructor: Dr C. C. Chan Presented by Uday Seelam.
® IBM Software Group ©IBM Corporation IBM Information Server Architecture Overview.
Implementing Secure IRC App with Elgamal By Hyungki Choi ID : Date :
CSCI 3327 Visual Basic Chapter 13: Databases and LINQ UTPA – Fall 2011.
© 2015 Pearson Education Ltd. Chapter 9 Chapter 9.
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
Structured Query Language SQL-II IST 210 Organization of Data IST2101.
Retele de senzori Curs 1 - 1st edition UNIVERSITATEA „ TRANSILVANIA ” DIN BRAŞOV FACULTATEA DE INGINERIE ELECTRICĂ ŞI ŞTIINŢA CALCULATOARELOR.
ODP V2 Data Provider overview. 22 Scope Data Provider provides access to data and metadata of the local data systems. Data Provider is a wrapper, installed.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
How To Start a SQL server Connecting to SQL Server.
2nd year Computer Science & Engineer
SQL Server 2000 and Access 2000 limits
Introduction to Web programming
CS1222 Using Relational Databases and SQL
Database Management  .
Database.
CS1222 Using Relational Databases and SQL
Quid Usage.
Topic 11 Lesson 1 - Analyzing Data in Access
September 12-14, 2018 Raleigh, NC.
Views for Excel and Reporting
Ch 1 .Installing and configuring SQL Server 2005
Security - Forms Authentication
Presentation transcript:

1 Figure 9-10: Database and Instant Messaging Security Concerns Other Applications  There are many other applications  Each has its own security issues

2 Figure 9-10: Database and Instant Messaging Security Concerns Database  Often used in mission-critical applications  Application layer authentication: Many database applications have passwords beyond the computer login password  Relational databases: Tables with rows (entities) and columns (attributes)

3 Figure 9-10: Database and Instant Messaging Security Concerns Database  Granularity of access control Restrict users to certain columns (attributes) in each row  For instance, deny access to salary column to most users Limit access control to rows, for instance, only rows containing data about people in the user’s own department

4 Figure 9-10: Database and Instant Messaging Security Concerns Database  Granularity of access control Prevent access to individual data: Allow trend analysts to deal only with sums and averages for aggregates such as departments

5 Figure 9-10: Database and Instant Messaging Security Concerns Database  Problems with commercial database servers Empty administrative password for Microsoft’s SQL Server allowed break-ins New version of SQL Server will be more locked down Default passwords for Oracle widely known

6 Figure 9-10: Database and Instant Messaging Security Concerns Instant Messaging (IM)  Allows instant text communication and voice if has “click to talk”  Retention problem: Not integrated into retention schedules  File transfer problem: File transfers are not checked by antivirus programs, although a few popular antivirus programs check file transmissions for a few popular IM programs.