Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment ECCAIRS Technical Course Provided by the Joint Research Centre - Ispra.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Database Security Policies and Procedures and Implementation for the Disaster Management Communication System Presented By: Radostina Georgieva Master.
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
1 Preparing Windows 2000 installation (Week 3, Wednesday 2/25/2006) © Abdou Illia, Spring 2006.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Database Management System
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
15.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
An Authorization Service using.NET Passport ™ as underlying Authentication Scheme Bar-Hen Ron Hochberger Daniel Winter 2002 Technion – Israel Institute.
Accounting & Billing System for the WEB Centre GDP 19 Donna Crawford (dc899) Chris O’Neill (ckjon101) Amit Shah (ams401) David Newman (drn101) Supervisor.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Window NT Workstation and Server. Windows NT refers to two products workstation server can act as both a client and server in a network environment.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 4 Profiles, Password Policies, Privileges, and Roles.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
System Intro ECCAIRS End-User Course
Jim McLeod MyDBA  SQL Server Performance Tuning Consultant with MyDBA  Microsoft Certified Trainer with SQLskills Australia 
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Hands-On Microsoft Windows Server 2008
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Configuring Encryption and Advanced Auditing
Technical Details – SAN PHARMA SFA. Front End / Back End Details  ASP  ASP.net  XML  JAVA Script  DHTML  MS SQL SERVER.
1 Week 6 – NPS and RADIUS Install and Configure a Network Policy Server Configure RADIUS Clients and Servers NPS Authentication Methods Monitor and Troubleshoot.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Module 11: Remote Access Fundamentals
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
The Client/Server Database Environment Ployphan Sornsuwit KPRU Ref.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
GPO - WINDOWS SERVER AGENDA: Introduction Group Policy Overview Types of Group Policies/Objects Associated Technologies How to implement.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
1 Introduction to Oracle Chapter 1. 2 Before Databases Information was kept in files: Each field describes one piece of information about student Fields.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 11: Managing Access to File System Resources.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Module 3: Planning Administrative Access. Overview Determining the Appropriate Administrative Model Designing Administrative Group Strategies Planning.
Module 7: Implementing Security Using Group Policy.
1 3 Computing System Fundamentals 3.3 Computer Systems.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment ECCAIRS Technical Course Provided by the Joint Research Centre - Ispra.
Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment ECCAIRS Technical Course Provided by the Joint Research Centre - Ispra.
Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment ECCAIRS Technical Course Provided by the Joint Research Centre - Ispra.
Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment ECCAIRS Technical Course Provided by the Joint Research Centre - Ispra.
Institute for the Protection and Security of the Citizen HAZAS - Hazard Assessment ECCAIRS Technical Course Provided by the Joint Research Centre - Ispra.
Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment ECCAIRS Technical Course Provided by the Joint Research Centre - Ispra.
Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment ECCAIRS Technical Course Provided by the Joint Research Centre - Ispra.
Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment ECCAIRS Technical Course Provided by the Joint Research Centre - Ispra.
Module 8 Implementing Security Using Group Policy.
Presentation ECCAIRS Technical Course
Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment ECCAIRS Technical Course Provided by the Joint Research Centre - Ispra.
Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment ECCAIRS Technical Course Provided by the Joint Research Centre - Ispra.
Introduction to Core Database Concepts Getting started with Databases and Structure Query Language (SQL)
International Civil Aviation Organization ADREP/ECCAIRS End-user course Module N° 6 Data Entry Mexico City November, 2010.
uses of DB systems DB environment DB structure Codd’s rules current common RDBMs implementations.
Computer Security Sample security policy Dr Alexei Vernitski.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
19 Copyright © 2008, Oracle. All rights reserved. Security.
SmartCenter for Pointsec - MI
Chapter Objectives In this chapter, you will learn:
Module Overview Installing and Configuring a Network Policy Server
The Client/Server Database Environment
FTP - File Transfer Protocol
Download dumps - Microsoft Real Exam Questions Dumps4download
Securing Windows 7 Lesson 10.
Group Policy Overview Group Policy 5.1
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment ECCAIRS Technical Course Provided by the Joint Research Centre - Ispra (Italy) Security

Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment 2 Security Task –Enforce company policy in data access Purpose –Impeding unauthorised users access to the ECCAIRS system –Restricting access to sensitive data to authorised users Methods –Password protected accounts –Encryption –Proprietary file formats –Abstraction of data

Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment 3 Security Levels Via Repository –Security implemented as repository profiles –No relation with DCOM or DBMS –Identification with username/password for the repository server –Detailed configuration at the server, propagated to the workstation –Maintained at client workstation when no connection to repository possible Configuration –Repository Manager (application) –Setting of Identification, Access and Configuration

Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment 4 Security Levels Via DCOM –Configuration only required at the Repository Server Security based on Windows domain identities If installed on PDC, then domain user Otherwise, local account: more secure Configuration –Computer Management Windows identity for remote access –DCOMCNFG (application) Access, Launch and Configuration permissions

Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment 5 Security Levels Via RDBMS –Configuration only required at the Database Server –Security based on RDBMS identities Configuration –RDBMS manager (SQL Enterprise Manager, DBA Studio) –Setting of Identification and Database

Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment 6 ECCAIRS Profiles –Proprietary format –Encrypted with proprietary encryption algorithm –Sometimes compressed ECCAIRS 4 Data Format –Encrypted with proprietary encryption algorithm –Sometimes compressed XML structure is not encrypted Result –Data only readable if there is a very profound knowledge of the ECCAIRS taxonomy, XML and the E4F specification

Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment 7 Repository Manager – Security Profile View vs. Security –View profile operates on data in workstation’s memory Assumes entire occurrence record is in memory Operates on screen allocation only Will not show “what is not there” –Security profile operates on data from and to database Will not retrieve from the database Will not write to the database –View profile handles down to sections –Security profile handles down to attributes Configuration issues –Risk of data loss If edit allowed, write back overwrites record in database –Should be synchronised with Browser Application profile –Consider using filter in Data Source profile