Page 147 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 147

Unit 10: Databases Security




          The Password File                                                                     Notes

          NCSA httpd occurs with a program known as htpasswd. To generate the password file and add
          a user to it, execute htpasswd /home/beowulf/public_html/.htpasswd pumpkin substituting
          the path for the password file to the path suitable for your system. The file will be generated and
          the username “pumpkin” added to it. You will be prompted twice for “pumpkin’s” password.
          There is totally no connection among users in this file and users on your local host. Users with
          local accounts can use the similar (or different) names in your local password file, with same (or
          different) passwords. Outside users can have usernames in this file without having an account
          on your system. This technique only controls access to the files in the preferred directory.
          Any user trying to use a file in the secluded directory will be encouraged for a password by their
          client browser, which will pass it back to your server for confirmation. If they are in the password
          file, access will be permitted.



             Did u know? Database security is of dominant significance for an organization, but many
             organizations do not take this truth into deliberation, till an ultimate problem appears.




              Task  What is audit trail?

          Self Assessment

          Fill in the blanks:
          1.   With many organizations using database dependent dynamic web pages, ........................
               information security has turn out to be tremendously significant.
          2.   Many security ........................ are not even available as attackers want to postponed a fix,
               and manufacturers do not want the harmful publicity.
          3.   The ........................ is a compilation of useful data and can be considered as the most essential
               constituent of an organization and its economic enlargement.
          4.   The ........................ records information concerning  the actions taken on firm critical of
               data.

          10.2 Need for Database Security


          The  general factor  in nowadays  global economy  where most  of the  business is prepared
          electronically by means of B2B [Business to Business] or by means of B2C [business to consumer]
          or other more conventional methods’ is electronic transfer and storage of data. This very electronic
          data is the organization major information assets. A negotiation of this data could bang the
          business out or holdup in the processing this data could direct to customer approval concerns
          and loss of market share.
          Regardless of how we look into this challenge, it is greatest significant from the viewpoint of
          the guardian of that electronic data to have it in a protected form that is readily available to
          the applications that are certified to access and influence it. In the interest of best practice in
          addition to keep this electronic data protected in the databases, here is a tool that adds value
          and highlights concerns before they could be demoralized. We are conversing about Secure
          Audit.



                                           LOVELY PROFESSIONAL UNIVERSITY                                   141
   142   143   144   145   146   147   148   149   150   151   152