Presentation is loading. Please wait.

Presentation is loading. Please wait.

Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 Databases, Controls, and Security.

Similar presentations


Presentation on theme: "Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 Databases, Controls, and Security."— Presentation transcript:

1 Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 Databases, Controls, and Security

2 Systems Analysis and Design in a Changing World, 6th Edition 2 Example Set of Tables With Primary Key and Foreign Key

3 Systems Analysis and Design in a Changing World, 6th Edition 3 Database and DBMS Components

4 Systems Analysis and Design in a Changing World, 6th Edition 4 Designing Data Base and System Controls Architecture Existing databases Integrity control – rejects invalid inputs, prevents unauthorized outputs, and protects data and programs against tampering Security controls – part of the operating system and network and tend to be less application specific.

5 Systems Analysis and Design in a Changing World, 6th Edition 5 Partitioning Database Schema Into Client Access Subsets

6 Systems Analysis and Design in a Changing World, 6th Edition 6 Architecture for RMO Replicated and Partitioned Database

7 Systems Analysis and Design in a Changing World, 6th Edition 7 Integrity and Security Controls

8 Systems Analysis and Design in a Changing World, 6th Edition 8 Integrity Controls Input Controls Value limit control Completeness control Data validation control Field combination control

9 Systems Analysis and Design in a Changing World, 6th Edition 9 Integrity Controls Cont. Access control Transaction logging Complex update control Output control Redundancy Backup Recovery

10 Systems Analysis and Design in a Changing World, 6th Edition 10 Integrity Controls To Prevent Fraud Fraud triangle – Opportunity, Motivation, and Rationalization must all exist for a fraud to occur

11 Systems Analysis and Design in a Changing World, 6th Edition 11 Integrity Controls To Prevent Fraud

12 Systems Analysis and Design in a Changing World, 6th Edition 12 Security Controls Access Controls

13 Systems Analysis and Design in a Changing World, 6th Edition 13 Security Controls Data Encryption Public key encryption – a form of asymmetric key encryption that uses a public key for encryption and a private key for decryption

14 Systems Analysis and Design in a Changing World, 6th Edition 14 Security Controls Digital Certificate Digital certificate -- an institution’s name and public key (plus other information, such as address, Web site URL, and validity date of the certificate) encrypted and certified by a third party Certifying authority -- a widely accepted issuer of digital certificates

15 Systems Analysis and Design in a Changing World, 6th Edition 15 Security Controls Secure Transactions Secure Sockets Layer (SSL) -- a standard set of methods and protocols that address authentication, authorization, privacy, and integrity Transport Layer Security (TLS) -- an Internet standard equivalent to SSL IP Security (IPSec) -- an Internet standard for secure transmission of low-level network packets Secure Hypertext Transport Protocol (HTTPS) -- an Internet standard for securely transmitting Web pages


Download ppt "Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 Databases, Controls, and Security."

Similar presentations


Ads by Google