This work features the following topics: Steganography exercise, Digital Watermarking exercise, Churchill secondary school data protection report, Database Authentication, Database Authorization: Privileges and role based security, Database Authorization and data integrity (Views, Constraints), Implementing Virtual private database, Churchill secondary school database security policy, Database Security Policy and Database Security policy implementation.
Table of Contents
1. Part 1
1.1 Weekly assignment: Steganography exercise
1.2 Weekly assignment: Digital Watermarking exercise
1.3 Churchill secondary school data protection report
1.4 Final Report
2. Part 2
2.1 Lab: Database Authentication
2.2 Lab: Database Authorization: Privileges and role based security
2.3 Lab: Database Authorization and data integrity (Views, Constraints)
2.4 Lab: Implementing Virtual private database
2.5 Churchill secondary school database security policy
2.5.1 Database Security Policy
2.5.2 Database Security policy implementation
2.5.3 Final Report
Objectives and Topics
The primary objective of this coursework is to explore and implement essential security measures for IT applications and database systems. The work covers data protection through steganography and watermarking, while also focusing on database security practices, including authentication protocols, role-based authorization, and the implementation of fine-grained access control using Virtual Private Database (VPD) technologies within an Oracle environment.
- Data protection and information hiding techniques
- Database authentication and user account management
- Database authorization, privileges, and role-based security
- Data integrity and enforcement of constraints
- Fine-grained access control using Views and Virtual Private Database (VPD)
Excerpt from the Book
1.1 Weekly Assignment: Steganography exercise
To, Mr. Wickchad, Managing Director, Wickchad Motors. Subject: - Advise on the use of steganography for inter-branch email communication. Dear Mr.Wickchad, I have analysed the proposed method for the use of steganography for inter-branch email communication. I am including the details of my analysis below in detail. The proposed picture consists of 8m pixels. So 8m pixels = 8000000 pixels. Picture uses 2 bytes to define colour of each pixel. So it is 16 bit grayscale image. Sampling factor = 0.5.
Expected result: Can hide 400 pages of A4 text. 1 word = 5 characters (Including Space). A4 page = 50 lines. 1 line = 10 words. After the detailed analysis of the proposed method, I saw that the expected result does not match the actual results. Below I am including the actual results with calculation and explanation.
Chapter Summary
1. Part 1: This section covers practical exercises in information security, specifically applying steganography and digital watermarking to demonstrate data hiding capabilities in images, alongside a data protection report for a secondary school.
2. Part 2: This section provides a series of laboratory projects focusing on Oracle database security, including user authentication, privilege management, data integrity constraints, and the implementation of fine-grained access control via views and VPD.
Keywords
Steganography, Digital Watermarking, Database Security, Authentication, Authorization, Role-based security, Data Integrity, Virtual Private Database, VPD, Application Context, Data Protection, SQL, Access Control, Encryption, Information Security
Frequently Asked Questions
What is the primary focus of this work?
The work focuses on IT application security, specifically demonstrating techniques for securing digital communication and managing database access control.
What are the core thematic areas?
The core themes include information hiding (steganography and watermarking), database user administration, authorization management, and policy enforcement through fine-grained access control.
What is the main objective of the coursework?
The primary objective is to evaluate and implement security measures that ensure the confidentiality, integrity, and authenticity of data within organizational environments.
Which scientific or technical methods are applied?
The work utilizes SQL-based database administration, PL/SQL for function and policy development, and mathematical calculation for determining image bit depth and data hiding capacities.
What content is covered in the main section?
The main section consists of two parts: practical labs for information hiding and comprehensive lab exercises for Oracle database security including authentication, profile management, and VPD policies.
Which keywords best characterize this work?
The most relevant keywords include Database Security, Steganography, Authorization, Role-based Access, and Virtual Private Database.
How is the steganography analysis evaluated?
The analysis evaluates the proposed method's capability by calculating pixel counts and bit depth, ultimately concluding that the initial expectations were mathematically inaccurate.
What is the purpose of the Churchill secondary school case study?
The case study serves as a practical application of data protection laws and security policies to classify users and assign appropriate privileges in an educational database environment.
Why is VPD preferred over simple database views?
VPD is preferred because it provides dynamic, fine-grained, context-sensitive access control that enforces business rules at the row and column level with higher performance and lower management overhead than creating multiple static views.
- Arbeit zitieren
- Dileep Keshava Narayana (Autor:in), 2012, IT Application Security and Control, München, GRIN Verlag, https://www.grin.com/document/450383