Grin logo
de en es fr
Shop
GRIN Website
Publicación mundial de textos académicos
Go to shop › Ciencia de la Computación - IT-Security

IT Application Security and Control

Título: IT Application Security and Control

Elaboración , 2012 , 41 Páginas , Calificación: 98

Autor:in: Dileep Keshava Narayana (Autor)

Ciencia de la Computación - IT-Security
Extracto de texto & Detalles   Leer eBook
Resumen Extracto de texto Detalles

This work features the following topics: Steganography exercise, Digital Watermarking exercise, Churchill secondary school data protection report, Database Authentication, Database Authorization: Privileges and role based security, Database Authorization and data integrity (Views, Constraints), Implementing Virtual private database, Churchill secondary school database security policy, Database Security Policy and Database Security policy implementation.

Extracto


Table of Contents

1. Part 1

1.1 Weekly assignment: Steganography exercise

1.2 Weekly assignment: Digital Watermarking exercise

1.3 Churchill secondary school data protection report

1.4 Final Report

2. Part 2

2.1 Lab: Database Authentication

2.2 Lab: Database Authorization: Privileges and role based security

2.3 Lab: Database Authorization and data integrity (Views, Constraints)

2.4 Lab: Implementing Virtual private database

2.5 Churchill secondary school database security policy

2.5.1 Database Security Policy

2.5.2 Database Security policy implementation

2.5.3 Final Report

Objectives and Topics

The primary objective of this coursework is to explore and implement essential security measures for IT applications and database systems. The work covers data protection through steganography and watermarking, while also focusing on database security practices, including authentication protocols, role-based authorization, and the implementation of fine-grained access control using Virtual Private Database (VPD) technologies within an Oracle environment.

  • Data protection and information hiding techniques
  • Database authentication and user account management
  • Database authorization, privileges, and role-based security
  • Data integrity and enforcement of constraints
  • Fine-grained access control using Views and Virtual Private Database (VPD)

Excerpt from the Book

1.1 Weekly Assignment: Steganography exercise

To, Mr. Wickchad, Managing Director, Wickchad Motors. Subject: - Advise on the use of steganography for inter-branch email communication. Dear Mr.Wickchad, I have analysed the proposed method for the use of steganography for inter-branch email communication. I am including the details of my analysis below in detail. The proposed picture consists of 8m pixels. So 8m pixels = 8000000 pixels. Picture uses 2 bytes to define colour of each pixel. So it is 16 bit grayscale image. Sampling factor = 0.5.

Expected result: Can hide 400 pages of A4 text. 1 word = 5 characters (Including Space). A4 page = 50 lines. 1 line = 10 words. After the detailed analysis of the proposed method, I saw that the expected result does not match the actual results. Below I am including the actual results with calculation and explanation.

Chapter Summary

1. Part 1: This section covers practical exercises in information security, specifically applying steganography and digital watermarking to demonstrate data hiding capabilities in images, alongside a data protection report for a secondary school.

2. Part 2: This section provides a series of laboratory projects focusing on Oracle database security, including user authentication, privilege management, data integrity constraints, and the implementation of fine-grained access control via views and VPD.

Keywords

Steganography, Digital Watermarking, Database Security, Authentication, Authorization, Role-based security, Data Integrity, Virtual Private Database, VPD, Application Context, Data Protection, SQL, Access Control, Encryption, Information Security

Frequently Asked Questions

What is the primary focus of this work?

The work focuses on IT application security, specifically demonstrating techniques for securing digital communication and managing database access control.

What are the core thematic areas?

The core themes include information hiding (steganography and watermarking), database user administration, authorization management, and policy enforcement through fine-grained access control.

What is the main objective of the coursework?

The primary objective is to evaluate and implement security measures that ensure the confidentiality, integrity, and authenticity of data within organizational environments.

Which scientific or technical methods are applied?

The work utilizes SQL-based database administration, PL/SQL for function and policy development, and mathematical calculation for determining image bit depth and data hiding capacities.

What content is covered in the main section?

The main section consists of two parts: practical labs for information hiding and comprehensive lab exercises for Oracle database security including authentication, profile management, and VPD policies.

Which keywords best characterize this work?

The most relevant keywords include Database Security, Steganography, Authorization, Role-based Access, and Virtual Private Database.

How is the steganography analysis evaluated?

The analysis evaluates the proposed method's capability by calculating pixel counts and bit depth, ultimately concluding that the initial expectations were mathematically inaccurate.

What is the purpose of the Churchill secondary school case study?

The case study serves as a practical application of data protection laws and security policies to classify users and assign appropriate privileges in an educational database environment.

Why is VPD preferred over simple database views?

VPD is preferred because it provides dynamic, fine-grained, context-sensitive access control that enforces business rules at the row and column level with higher performance and lower management overhead than creating multiple static views.

Final del extracto de 41 páginas  - subir

Detalles

Título
IT Application Security and Control
Universidad
University of Greenwich  (University of Greenwich)
Curso
Network & Computer systems security
Calificación
98
Autor
Dileep Keshava Narayana (Autor)
Año de publicación
2012
Páginas
41
No. de catálogo
V450383
ISBN (Ebook)
9783668838604
ISBN (Libro)
9783668838611
Idioma
Inglés
Etiqueta
IT Application Security Control Computers
Seguridad del producto
GRIN Publishing Ltd.
Citar trabajo
Dileep Keshava Narayana (Autor), 2012, IT Application Security and Control, Múnich, GRIN Verlag, https://www.grin.com/document/450383
Leer eBook
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
Extracto de  41  Páginas
Grin logo
  • Grin.com
  • Envío
  • Contacto
  • Privacidad
  • Aviso legal
  • Imprint