Grin logo
en de es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Computer Science - IT-Security

IT Application Security and Control

Title: IT Application Security and Control

Elaboration , 2012 , 41 Pages , Grade: 98

Autor:in: Dileep Keshava Narayana (Author)

Computer Science - IT-Security
Excerpt & Details   Look inside the ebook
Summary Excerpt Details

This work features the following topics: Steganography exercise, Digital Watermarking exercise, Churchill secondary school data protection report, Database Authentication, Database Authorization: Privileges and role based security, Database Authorization and data integrity (Views, Constraints), Implementing Virtual private database, Churchill secondary school database security policy, Database Security Policy and Database Security policy implementation.

Excerpt


Inhaltsverzeichnis (Table of Contents)

  • Part 1
    • Weekly Assignment: Steganography exercise
    • Weekly Assignment: Digital Watermarking exercise
    • Churchill secondary school data protection report
    • Final Report
  • Part 2
    • Lab: Database Authentication
      • Overview
      • Exploring data dictionary
      • Creating a new user
      • Creating and using profile
    • Lab: Database Authorization: Privileges and role-based security
      • Overview
      • Connect as your original yoda user and create a new table.
      • Granting privileges to a new user.
      • Create a second user and grant necessary privileges.
      • Revoking privileges.
    • Lab: Database Authorization & Data integrity (views, constraints)
      • Implementing integrity constraints.
      • Creating views
    • Lab: Implementing Virtual private database
      • Investigate application context using SYS_CONTEXT function.
      • Create VPD that implement fine-grained access requirement: each doctor can see information only about his/her patients in the APPOINTMENT table.
      • Test your VPD as Nina Patel and as Walter Patterson.
    • Lab: Churchill secondary school database security policy
      • Database Security policy:
      • Database Security policy implementation: (profiles, roles, permissions, privileges, VPD, Views)
      • Final report: -

Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)

This coursework focuses on understanding and applying database security concepts to ensure data confidentiality, integrity, and availability in an organizational context. It explores practical implementations of security policies and techniques through various lab exercises, using the example of Churchill secondary school.

  • Database Security Policies and Implementation
  • Authentication and Authorization
  • Fine-grained Access Control using VPD and Views
  • Data Integrity and Constraint Management
  • Role-based Access Control

Zusammenfassung der Kapitel (Chapter Summaries)

  • Part 1: This section focuses on practical exercises related to steganography, digital watermarking, and data protection policies. It includes a detailed analysis of a proposed steganography method and suggests improvements for enhancing security. It also demonstrates how to implement a data protection report for a school, addressing key considerations like confidentiality and access rights for different staff roles.
  • Part 2: This section delves into database security, covering essential concepts like database authentication, authorization, and data integrity. It explores the use of data dictionary for user information, creating new user accounts, managing password policies, and assigning profiles. Furthermore, it demonstrates the practical implementation of privileges and roles for different users, including the creation of roles and assignment of permissions for specific tasks. The labs also cover implementing data integrity constraints using table creation and data manipulation. The final lab delves into virtual private databases (VPD) and how to implement fine-grained access control using VPD and application context. It explains the use of SYS_CONTEXT function to retrieve application context information and how to apply security policies for different user roles.

Schlüsselwörter (Keywords)

This coursework explores IT application security and control using real-world examples. It focuses on concepts such as database security, authentication, authorization, data integrity, VPD (Virtual Private Database), views, roles, privileges, and data protection. It examines the implementation of these concepts in a school environment, highlighting the importance of secure practices in educational settings.

Excerpt out of 41 pages  - scroll top

Details

Title
IT Application Security and Control
College
University of Greenwich  (University of Greenwich)
Course
Network & Computer systems security
Grade
98
Author
Dileep Keshava Narayana (Author)
Publication Year
2012
Pages
41
Catalog Number
V450383
ISBN (eBook)
9783668838604
ISBN (Book)
9783668838611
Language
English
Tags
IT Application Security Control Computers
Product Safety
GRIN Publishing GmbH
Quote paper
Dileep Keshava Narayana (Author), 2012, IT Application Security and Control, Munich, GRIN Verlag, https://www.grin.com/document/450383
Look inside the ebook
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
Excerpt from  41  pages
Grin logo
  • Grin.com
  • Payment & Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint