là thông tin có thể được truy xuất bởi những người được phép vào bất cứ khi nào họ muốn.
Câu 3: Ý nghĩa của tam giác chất lượng
The Business viewpoint: focusing on the business aspect, one that produces solve a business problem one that produces solve a business problem
The Resources viewpoint: is focusing on managing resources such as people, etc. The goal is on delivering the resources such as people, etc. The goal is on delivering the project on-time, and within budget.
The Quality viewpoint: is focusing on the need to deliver solutions with a good one that is integrated and cohesive solutions with a good one that is integrated and cohesive
o Cung cấp cho người dùng các chức năng như tạo, truy xuất, cập nhật và quản lý dữ liệu trên cơ sở dữ liệu. xuất, cập nhật và quản lý dữ liệu trên cơ sở dữ liệu.
o Ngoài chức năng giúp quản lý dữ liệu thì các hệ thống
quản trị cơ sở dữ liệu còn cung cấp cho người dùng chức năng kiểm soát quyền truy cập đọc / ghi, chỉ định tạo báo năng kiểm soát quyền truy cập đọc / ghi, chỉ định tạo báo cáo và phân tích việc sử dụng
o Cơ sở dữ liệu doanh nghiệp phục vụ cho toàn bộ tổ chức
Phân tích 10 công cụ bảo mật: - Authentication: - Authentication:
+ The most common way to identify someone is through their physical appearance. their physical appearance.
+ Authentication can be accomplished by identifying someone through one or more of three factors: someone through one or more of three factors:
1. Something they know 2. Something they have, or 2. Something they have, or 3. Something they are.
+ A more secure way to authenticate a user is through multi-factor authentication. By combining two or more of the actors factor authentication. By combining two or more of the actors listed above, it be comes much more dif ficult for someone to misrepresent themselves.
- Access Control: Two of the more common are: the Access Control List (ACL) and Role-Based Access Control (RBAC). Control List (ACL) and Role-Based Access Control (RBAC). + ACLs are simple to understand and maintain, but there ar e several drawbacks. The primary drawback is that each
information resource is managed separately, so if a security administrator wanted to add or remove a user to a large set of administrator wanted to add or remove a user to a large set of information resources, it would be quite difficult. And as the
number of users and resources increase, ACLs become harder to maintain. to maintain.
+ With RBAC, instead of giving specific users access rights to an information resource, users are assigned to roles and to an information resource, users are assigned to roles and then those roles are assigned the access. This allows the administrators to manage users and roles separately,
simplifying administration and, by extension, improving security. security.