1. Trang chủ
  2. » Mẫu Slide

Management of Security

72 127 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 72
Dung lượng 590,5 KB

Nội dung

OFFICE OF THE ACCOUNTANT GENERAL (A&E), KERALA Management of Security in VLC Software Security in VLC Software is administered by a user with DBA privileges, VLCADMIN, and is managed through the Administration Module The Security and Administration module provides extensive security features to safeguard the data from both unauthorised viewing and intentional tampering In addition, it maintains the users and defines users by creating roles and functions, audits all deleted records and checks SQL facilities Security is provided by granting specific privileges to roles and then assigning roles to users Roles are created by the administrator for every module by granting the type of access, full or read only, on related database objects depending on the module requirement and the status and responsibilities of the user It is invoked from the Modules drop down Menu The first screen of the Administration Module offers the Menu for all Administration activities The Main Menu item are > Module other Administration > Roles > Users > Report > Exit Before going into the finer details of the sub menus a detour for a brief look at the security features in Oracle Database Security Concepts • Confidentiality, integrity, and availability are the hallmarks of database security • Securing your database involves not only establishing strong password policy, but also adequate access controls • Security is also about the weakest link Databases should not provide a point of weakness Database Security Concepts (Contd…) • Security in Oracle has several layers • The first layer of security is, of course, the RAW assignment and management of users • The second layer is the high-level system grants that give the user permission to create, alter, and use database objects such as tables, indexes, and clusters • The third layer of security is the object-level grants that allow users to interact with database objects • The fourth layer is the column grant layer that grants or restricts access to the specific columns inside a database object • The fifth layer involves the use of policies and contexts to control row level access The final level of security deals with controlling access to system resources such as CPUs and is accomplished through the use of profiles and resource plans and groups In VLC Software the VLCADMIN user creates users using the ‘User Creation and Role Allocation’ sub menu under the ‘Users’ menu item – Data is protected by • Defining the types/levels of users • Defining area of work for each user • Providing various tiers of security for each user Types of Users : - Data Entry Operators - Supervisors - Management VLC Software incorporates an added security feature All sub menu actions are protected from unauthorised users Each action calls for a separate log on thus preventing unauthorised users from adding/deleting or modifying Users, Roles or Modules • The Administration module is so designed that first a module master is created It is followed by the creation of Roles • A user can be created only after creation of Modules and Roles • This ensures effective implementation of the Oracle Security feature of user grants and privileges ... provide a point of weakness Database Security Concepts (Contd…) • Security in Oracle has several layers • The first layer of security is, of course, the RAW assignment and management of users • The... users • Defining area of work for each user • Providing various tiers of security for each user Types of Users : - Data Entry Operators - Supervisors - Management VLC Software incorporates an... look at the software will clarify how it is implemented in the VLC Software A Detailed look at Security and Administration Module of VLC Software The first step in the implementation of the Security

Ngày đăng: 05/12/2016, 17:57

TỪ KHÓA LIÊN QUAN