Grin logo
de en es fr
Shop
GRIN Website
Texte veröffentlichen, Rundum-Service genießen
Zur Shop-Startseite › Informatik - IT-Security

IT Application Security and Control

Titel: IT Application Security and Control

Ausarbeitung , 2012 , 41 Seiten , Note: 98

Autor:in: Dileep Keshava Narayana (Autor:in)

Informatik - IT-Security
Leseprobe & Details   Blick ins Buch
Zusammenfassung Leseprobe Details

This work features the following topics: Steganography exercise, Digital Watermarking exercise, Churchill secondary school data protection report, Database Authentication, Database Authorization: Privileges and role based security, Database Authorization and data integrity (Views, Constraints), Implementing Virtual private database, Churchill secondary school database security policy, Database Security Policy and Database Security policy implementation.

Leseprobe


Table of Contents

1. Part 1

1.1 Weekly assignment: Steganography exercise

1.2 Weekly assignment: Digital Watermarking exercise

1.3 Churchill secondary school data protection report

1.4 Final Report

2. Part 2

2.1 Lab: Database Authentication

2.2 Lab: Database Authorization: Privileges and role based security

2.3 Lab: Database Authorization and data integrity (Views, Constraints)

2.4 Lab: Implementing Virtual private database

2.5 Churchill secondary school database security policy

2.5.1 Database Security Policy

2.5.2 Database Security policy implementation

2.5.3 Final Report

Objectives and Topics

The primary objective of this coursework is to explore and implement essential security measures for IT applications and database systems. The work covers data protection through steganography and watermarking, while also focusing on database security practices, including authentication protocols, role-based authorization, and the implementation of fine-grained access control using Virtual Private Database (VPD) technologies within an Oracle environment.

  • Data protection and information hiding techniques
  • Database authentication and user account management
  • Database authorization, privileges, and role-based security
  • Data integrity and enforcement of constraints
  • Fine-grained access control using Views and Virtual Private Database (VPD)

Excerpt from the Book

1.1 Weekly Assignment: Steganography exercise

To, Mr. Wickchad, Managing Director, Wickchad Motors. Subject: - Advise on the use of steganography for inter-branch email communication. Dear Mr.Wickchad, I have analysed the proposed method for the use of steganography for inter-branch email communication. I am including the details of my analysis below in detail. The proposed picture consists of 8m pixels. So 8m pixels = 8000000 pixels. Picture uses 2 bytes to define colour of each pixel. So it is 16 bit grayscale image. Sampling factor = 0.5.

Expected result: Can hide 400 pages of A4 text. 1 word = 5 characters (Including Space). A4 page = 50 lines. 1 line = 10 words. After the detailed analysis of the proposed method, I saw that the expected result does not match the actual results. Below I am including the actual results with calculation and explanation.

Chapter Summary

1. Part 1: This section covers practical exercises in information security, specifically applying steganography and digital watermarking to demonstrate data hiding capabilities in images, alongside a data protection report for a secondary school.

2. Part 2: This section provides a series of laboratory projects focusing on Oracle database security, including user authentication, privilege management, data integrity constraints, and the implementation of fine-grained access control via views and VPD.

Keywords

Steganography, Digital Watermarking, Database Security, Authentication, Authorization, Role-based security, Data Integrity, Virtual Private Database, VPD, Application Context, Data Protection, SQL, Access Control, Encryption, Information Security

Frequently Asked Questions

What is the primary focus of this work?

The work focuses on IT application security, specifically demonstrating techniques for securing digital communication and managing database access control.

What are the core thematic areas?

The core themes include information hiding (steganography and watermarking), database user administration, authorization management, and policy enforcement through fine-grained access control.

What is the main objective of the coursework?

The primary objective is to evaluate and implement security measures that ensure the confidentiality, integrity, and authenticity of data within organizational environments.

Which scientific or technical methods are applied?

The work utilizes SQL-based database administration, PL/SQL for function and policy development, and mathematical calculation for determining image bit depth and data hiding capacities.

What content is covered in the main section?

The main section consists of two parts: practical labs for information hiding and comprehensive lab exercises for Oracle database security including authentication, profile management, and VPD policies.

Which keywords best characterize this work?

The most relevant keywords include Database Security, Steganography, Authorization, Role-based Access, and Virtual Private Database.

How is the steganography analysis evaluated?

The analysis evaluates the proposed method's capability by calculating pixel counts and bit depth, ultimately concluding that the initial expectations were mathematically inaccurate.

What is the purpose of the Churchill secondary school case study?

The case study serves as a practical application of data protection laws and security policies to classify users and assign appropriate privileges in an educational database environment.

Why is VPD preferred over simple database views?

VPD is preferred because it provides dynamic, fine-grained, context-sensitive access control that enforces business rules at the row and column level with higher performance and lower management overhead than creating multiple static views.

Ende der Leseprobe aus 41 Seiten  - nach oben

Details

Titel
IT Application Security and Control
Hochschule
University of Greenwich  (University of Greenwich)
Veranstaltung
Network & Computer systems security
Note
98
Autor
Dileep Keshava Narayana (Autor:in)
Erscheinungsjahr
2012
Seiten
41
Katalognummer
V450383
ISBN (eBook)
9783668838604
ISBN (Buch)
9783668838611
Sprache
Englisch
Schlagworte
IT Application Security Control Computers
Produktsicherheit
GRIN Publishing GmbH
Arbeit zitieren
Dileep Keshava Narayana (Autor:in), 2012, IT Application Security and Control, München, GRIN Verlag, https://www.grin.com/document/450383
Blick ins Buch
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
Leseprobe aus  41  Seiten
Grin logo
  • Grin.com
  • Versand
  • Kontakt
  • Datenschutz
  • AGB
  • Impressum