Access The L Line The Express Line to Learning 2007 L Line L © Wiley Publishing. 2007. All Rights Reserved.

Slides:



Advertisements
Similar presentations
AD User Import From SIMS.NET
Advertisements

Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely P J Human Resources Pte Ltd presents:
1 Chapter 13 Securing an Access Application. 13 Chapter Objectives Learn about the elements of security Explore application-level security Use user-level.
With Microsoft Access 2010© 2011 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Access.
Step-by-Step: Set an Access Password for a Document OPEN the peerreview document from the lesson folder. 1.Click the File tab and then click the Save As.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Triple-Layered Security. INHERITED SECURITY User/Group Management Single Sign On Object Level Security Row Level Security File Management ROAMBI SECURITY.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
XP Tutorial 9 New Perspectives on Microsoft Windows XP 1 Microsoft Windows XP Exploring Your Network Tutorial 9.
Lesson 17: Configuring Security Policies
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Grid Security. Typical Grid Scenario Users Resources.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
SECURITY What does this word mean to you? The sum of all measures taken to prevent loss of any kind.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
Lesson 18: Configuring Application Restriction Policies
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
Sharing and Accessing Network Resources By Nanda Ganesan, Ph.D. © All Rights Reserved.
Group Accounts; Securing Resources with Permissions
1 Using Compressed Files and Folders Applications and operating systems read and write to compressed files. NTFS uncompresses the file before making it.
11 WORKING WITH COMPUTER ACCOUNTS Chapter 8. Chapter 8: WORKING WITH COMPUTER ACCOUNTS2 CHAPTER OVERVIEW Describe the process of adding a computer to.
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Jim McLeod MyDBA  SQL Server Performance Tuning Consultant with MyDBA  Microsoft Certified Trainer with SQLskills Australia 
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
IOS110 Introduction to Operating Systems using Windows Session 7 1.
Week #7 Objectives: Secure Windows 7 Desktop
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely presents:
XP Chapter 2 Succeeding in Business with Microsoft Office Access 2003: A Problem-Solving Approach 1 Building The Database Chapter 2 “It is only the farmer.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Breno de MedeirosFlorida State University Fall 2005 Windows servers The NT security model.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
1 Chapter Overview Publishing Resources in Active Directory Service Redirecting Folders Using Group Policies Deploying Applications Using Group Policies.
1 Chapter Overview Understanding User Accounts Planning New User Accounts Creating, Modifying, and Deleting User Accounts Setting Properties for User Accounts.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Microsoft Access 2010 Chapter 10 Administering a Database System.
Access The L Line The Express Line to Learning 2007 L Line L © Wiley Publishing All Rights Reserved.
Page 1 NTFS and Share Permissions Lecture 6 Hassan Shuja 10/26/2004.
McGraw-Hill/Irwin The Interactive Computing Series © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Microsoft Access 2002 Using Access Tools.
Securing a Database 1.Understanding database security 2.Protecting the Database File 3.Protecting Code 4.Using User level Security 5.Working with workgroups.
1 All Powder Board and Ski Microsoft Access Workbook Chapter 9: Database Administration Jerry Post Copyright © 2003.
Administering Group Policy Chapter Eleven. Exam Objectives in this Chapter  Plan a Group Policy strategy using Resultant Set of Policy Planning mode.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
NetTech Solutions Security and Security Permissions Lesson Nine.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 14 – Windows Security.
Module 6: Configuring User Environments Using Group Policies.
Module 6: Administering Reporting Services. Overview Server Administration Performance and Reliability Monitoring Database Administration Security Administration.
Module 4: Managing Access to Resources. Overview Overview of Managing Access to Resources Managing Access to Shared Folders Managing Access to Files and.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
1 Introduction to Shared Folders Shared folders provide network users access to files. Users connect to the shared folder over the network. Users must.
Secure Data Access with SQL Server 2005 Doug Rees Associate Technologist, CM Group
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
11 SUPPORTING WINDOWS XP FILE AND FOLDER ACCESS Chapter 5.
19 Copyright © 2008, Oracle. All rights reserved. Security.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Guide to Operating Systems, 5th Edition
Grid Security.
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Utilize Group Policy Terminal Server Settings
Uses Of Encryption Algorithms
ELECTRONIC MAIL SECURITY
ELECTRONIC MAIL SECURITY
Network Locations in Windows 7
Presentation transcript:

Access The L Line The Express Line to Learning 2007 L Line L © Wiley Publishing All Rights Reserved.

Securing Access Databases 15 * Understanding security in Access 2007 * Trusting locations and publishers * Packaging databases for distribution * Preventing database tampering Stations Along the Way

Access 2007 Security Changes Features removed:  User-level security  The Workgroup Administrator application Features added:  Trusted computing  Operating system control of user access  Internal application security  Stronger encryption scheme

Handling User-Level Security The process…  Define a user group  Place databases to share in common folder  Define sharing options  Grant permissions to the user group

Connecting to the Shared Folder The process…  Map a network drive to the folder location  Supply the server and share names Syntax: \\servername\sharename Example: \\ \Databases  Reconnect at logon with a user name and password

Password Protecting the Database  Adds database encryption  Requires the password to open the database  Works best with good passwords… At least 10 characters Capital and lowercase characters Numbers and alternative characters Hard to guess, but easy to remember Not in the dictionary  Is a reversible process (decryption)

Enabling Trusted Computing Trusted Setting What It DoesDefault Trusted Location Trusts all content in a specified location Untrusted Trusted Content Trusts executable content for a specified database and session Untrusted

Creating Signed Databases Signed databases…  Contain a security certificate  Can use the SelfCert tool  Indicate a certified publisher  Can distribute safe-to-use content  Must be extracted and accepted

Using File Extensions for Security Access 2007 Extension ReplacesMode ACCDBMDBFull-access mode ACCDEMDEExecute-only mode; users can’t change code or design ACCDRn/aRuntime mode; blocks direct access to database objects

Discussion Topics What types of security does Access 2007 support? How can I protect my databases on a network? What’s a trusted publisher? How can I prevent users from changing the design or code in a database?