Download presentation
Presentation is loading. Please wait.
Published byEustace Newton Modified over 9 years ago
1
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 Databases, Controls, and Security
2
Systems Analysis and Design in a Changing World, 6th Edition 2 Example Set of Tables With Primary Key and Foreign Key
3
Systems Analysis and Design in a Changing World, 6th Edition 3 Database and DBMS Components
4
Systems Analysis and Design in a Changing World, 6th Edition 4 Designing Data Base and System Controls Architecture Existing databases Integrity control – rejects invalid inputs, prevents unauthorized outputs, and protects data and programs against tampering Security controls – part of the operating system and network and tend to be less application specific.
5
Systems Analysis and Design in a Changing World, 6th Edition 5 Partitioning Database Schema Into Client Access Subsets
6
Systems Analysis and Design in a Changing World, 6th Edition 6 Architecture for RMO Replicated and Partitioned Database
7
Systems Analysis and Design in a Changing World, 6th Edition 7 Integrity and Security Controls
8
Systems Analysis and Design in a Changing World, 6th Edition 8 Integrity Controls Input Controls Value limit control Completeness control Data validation control Field combination control
9
Systems Analysis and Design in a Changing World, 6th Edition 9 Integrity Controls Cont. Access control Transaction logging Complex update control Output control Redundancy Backup Recovery
10
Systems Analysis and Design in a Changing World, 6th Edition 10 Integrity Controls To Prevent Fraud Fraud triangle – Opportunity, Motivation, and Rationalization must all exist for a fraud to occur
11
Systems Analysis and Design in a Changing World, 6th Edition 11 Integrity Controls To Prevent Fraud
12
Systems Analysis and Design in a Changing World, 6th Edition 12 Security Controls Access Controls
13
Systems Analysis and Design in a Changing World, 6th Edition 13 Security Controls Data Encryption Public key encryption – a form of asymmetric key encryption that uses a public key for encryption and a private key for decryption
14
Systems Analysis and Design in a Changing World, 6th Edition 14 Security Controls Digital Certificate Digital certificate -- an institution’s name and public key (plus other information, such as address, Web site URL, and validity date of the certificate) encrypted and certified by a third party Certifying authority -- a widely accepted issuer of digital certificates
15
Systems Analysis and Design in a Changing World, 6th Edition 15 Security Controls Secure Transactions Secure Sockets Layer (SSL) -- a standard set of methods and protocols that address authentication, authorization, privacy, and integrity Transport Layer Security (TLS) -- an Internet standard equivalent to SSL IP Security (IPSec) -- an Internet standard for secure transmission of low-level network packets Secure Hypertext Transport Protocol (HTTPS) -- an Internet standard for securely transmitting Web pages
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.