Grin logo
de en es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Computer Science - IT-Security

IT Application Security and Control

Title: IT Application Security and Control

Elaboration , 2012 , 41 Pages , Grade: 98

Autor:in: Dileep Keshava Narayana (Author)

Computer Science - IT-Security
Excerpt & Details   Look inside the ebook
Summary Excerpt Details

This work features the following topics: Steganography exercise, Digital Watermarking exercise, Churchill secondary school data protection report, Database Authentication, Database Authorization: Privileges and role based security, Database Authorization and data integrity (Views, Constraints), Implementing Virtual private database, Churchill secondary school database security policy, Database Security Policy and Database Security policy implementation.

Excerpt


Table of Contents

1. Part 1

1.1 Weekly assignment: Steganography exercise

1.2 Weekly assignment: Digital Watermarking exercise

1.3 Churchill secondary school data protection report

1.4 Final Report

2. Part 2

2.1 Lab: Database Authentication

2.2 Lab: Database Authorization: Privileges and role based security

2.3 Lab: Database Authorization and data integrity (Views, Constraints)

2.4 Lab: Implementing Virtual private database

2.5 Churchill secondary school database security policy

2.5.1 Database Security Policy

2.5.2 Database Security policy implementation

2.5.3 Final Report

Objectives and Topics

The primary objective of this coursework is to explore and implement essential security measures for IT applications and database systems. The work covers data protection through steganography and watermarking, while also focusing on database security practices, including authentication protocols, role-based authorization, and the implementation of fine-grained access control using Virtual Private Database (VPD) technologies within an Oracle environment.

  • Data protection and information hiding techniques
  • Database authentication and user account management
  • Database authorization, privileges, and role-based security
  • Data integrity and enforcement of constraints
  • Fine-grained access control using Views and Virtual Private Database (VPD)

Excerpt from the Book

1.1 Weekly Assignment: Steganography exercise

To, Mr. Wickchad, Managing Director, Wickchad Motors. Subject: - Advise on the use of steganography for inter-branch email communication. Dear Mr.Wickchad, I have analysed the proposed method for the use of steganography for inter-branch email communication. I am including the details of my analysis below in detail. The proposed picture consists of 8m pixels. So 8m pixels = 8000000 pixels. Picture uses 2 bytes to define colour of each pixel. So it is 16 bit grayscale image. Sampling factor = 0.5.

Expected result: Can hide 400 pages of A4 text. 1 word = 5 characters (Including Space). A4 page = 50 lines. 1 line = 10 words. After the detailed analysis of the proposed method, I saw that the expected result does not match the actual results. Below I am including the actual results with calculation and explanation.

Chapter Summary

1. Part 1: This section covers practical exercises in information security, specifically applying steganography and digital watermarking to demonstrate data hiding capabilities in images, alongside a data protection report for a secondary school.

2. Part 2: This section provides a series of laboratory projects focusing on Oracle database security, including user authentication, privilege management, data integrity constraints, and the implementation of fine-grained access control via views and VPD.

Keywords

Steganography, Digital Watermarking, Database Security, Authentication, Authorization, Role-based security, Data Integrity, Virtual Private Database, VPD, Application Context, Data Protection, SQL, Access Control, Encryption, Information Security

Frequently Asked Questions

What is the primary focus of this work?

The work focuses on IT application security, specifically demonstrating techniques for securing digital communication and managing database access control.

What are the core thematic areas?

The core themes include information hiding (steganography and watermarking), database user administration, authorization management, and policy enforcement through fine-grained access control.

What is the main objective of the coursework?

The primary objective is to evaluate and implement security measures that ensure the confidentiality, integrity, and authenticity of data within organizational environments.

Which scientific or technical methods are applied?

The work utilizes SQL-based database administration, PL/SQL for function and policy development, and mathematical calculation for determining image bit depth and data hiding capacities.

What content is covered in the main section?

The main section consists of two parts: practical labs for information hiding and comprehensive lab exercises for Oracle database security including authentication, profile management, and VPD policies.

Which keywords best characterize this work?

The most relevant keywords include Database Security, Steganography, Authorization, Role-based Access, and Virtual Private Database.

How is the steganography analysis evaluated?

The analysis evaluates the proposed method's capability by calculating pixel counts and bit depth, ultimately concluding that the initial expectations were mathematically inaccurate.

What is the purpose of the Churchill secondary school case study?

The case study serves as a practical application of data protection laws and security policies to classify users and assign appropriate privileges in an educational database environment.

Why is VPD preferred over simple database views?

VPD is preferred because it provides dynamic, fine-grained, context-sensitive access control that enforces business rules at the row and column level with higher performance and lower management overhead than creating multiple static views.

Excerpt out of 41 pages  - scroll top

Details

Title
IT Application Security and Control
College
University of Greenwich  (University of Greenwich)
Course
Network & Computer systems security
Grade
98
Author
Dileep Keshava Narayana (Author)
Publication Year
2012
Pages
41
Catalog Number
V450383
ISBN (eBook)
9783668838604
ISBN (Book)
9783668838611
Language
English
Tags
IT Application Security Control Computers
Product Safety
GRIN Publishing GmbH
Quote paper
Dileep Keshava Narayana (Author), 2012, IT Application Security and Control, Munich, GRIN Verlag, https://www.grin.com/document/450383
Look inside the ebook
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
Excerpt from  41  pages
Grin logo
  • Grin.com
  • Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint