Physical Design and Implementation

Physical Design and Implementation

Professor: Peter Chow
Introduction to relational database management
08/17/2013











    • The security mechanisms available for a database and how the data will be protected

      While discussing about the security requirements in the overall technical design, there are various attributes which need to considered and play significant role. The most important being eases to the user front in terms of access of data. The numbers of applications that have been deployed for users such as online querying and access to office resources have proved effective both to the service provider as well as the users. The users can access useful information from anywhere in the world through internet. Network level security is utmost important for the given scenario. Security checks need to be present at various nodes of the network to check whether authentic applications with correct details is flowing in the system or has been corrupted. Proper encryption and decryption techniques should be followed so that no outsider can access the data and probably misuse it. (Noureddine,2005)




    • Explain how to defeat SQL injection attacks since the database will be publicly accessible

      Network systems and visiting for sites may carry information from and to many systems. This leads the applications to be infected by unwanted malicious threats. Hence attention should be paid as to keep a track on authentic application code. Threats can transmit from one system to another with data to be transferred. If one system is infected and data is sent from that system to another (for example a file) then malicious threat may replicate and infect the destination system also. Software threats are increasing every moment. Hence the software that checks these threats should be updated regularly so that no threat goes unchecked. Moreover the updated software should be provided to users as soon as possible. (Khamal, 2007)...