Page 147 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 147
Unit 10: Databases Security
The Password File Notes
NCSA httpd occurs with a program known as htpasswd. To generate the password file and add
a user to it, execute htpasswd /home/beowulf/public_html/.htpasswd pumpkin substituting
the path for the password file to the path suitable for your system. The file will be generated and
the username “pumpkin” added to it. You will be prompted twice for “pumpkin’s” password.
There is totally no connection among users in this file and users on your local host. Users with
local accounts can use the similar (or different) names in your local password file, with same (or
different) passwords. Outside users can have usernames in this file without having an account
on your system. This technique only controls access to the files in the preferred directory.
Any user trying to use a file in the secluded directory will be encouraged for a password by their
client browser, which will pass it back to your server for confirmation. If they are in the password
file, access will be permitted.
Did u know? Database security is of dominant significance for an organization, but many
organizations do not take this truth into deliberation, till an ultimate problem appears.
Task What is audit trail?
Self Assessment
Fill in the blanks:
1. With many organizations using database dependent dynamic web pages, ........................
information security has turn out to be tremendously significant.
2. Many security ........................ are not even available as attackers want to postponed a fix,
and manufacturers do not want the harmful publicity.
3. The ........................ is a compilation of useful data and can be considered as the most essential
constituent of an organization and its economic enlargement.
4. The ........................ records information concerning the actions taken on firm critical of
data.
10.2 Need for Database Security
The general factor in nowadays global economy where most of the business is prepared
electronically by means of B2B [Business to Business] or by means of B2C [business to consumer]
or other more conventional methods’ is electronic transfer and storage of data. This very electronic
data is the organization major information assets. A negotiation of this data could bang the
business out or holdup in the processing this data could direct to customer approval concerns
and loss of market share.
Regardless of how we look into this challenge, it is greatest significant from the viewpoint of
the guardian of that electronic data to have it in a protected form that is readily available to
the applications that are certified to access and influence it. In the interest of best practice in
addition to keep this electronic data protected in the databases, here is a tool that adds value
and highlights concerns before they could be demoralized. We are conversing about Secure
Audit.
LOVELY PROFESSIONAL UNIVERSITY 141