Professional Documents
Culture Documents
GROUP 1
MEMBERS:
ABUBAKAR
AGASCON
AGCAOILI
APACIBLE
BAMBA
TALATALA
UNITO
VALENZUELA J.
VALLAREZ
YANG
4 PICS 1 WORD
ANSWER:
DATABASE
ANSWER:
SECURITY
ANSWER:
PLANNING
DATABASE SECURITY
AND INTEGRITY
PLANNING FOR
SECURITY
OBJECTIVE:
USER MAKER
SOFTWARE
SECURITY
VULNERABILITIES
DESIGN INSTALLATION
AND
AND
IMPLEMENTATION CONFIGURATION
SECURITY RISK
Access Viruses
DATABASE
SECURITY RISKS
Data Leakage
Password
SECURITY THREAT
MALICIOUS CODE
PEOPLE
DATABASE
SECURITY THREATS
TECHNOLOGICAL
DISASTERS
NATURAL DISASTERS
DATABASE SECURITY METHODS
DATABASE COMPONENTS PROTECTED SECURITY METHODS
2. APPLICATIONS
Apply Business rules
A Single sign on
DATABASE COMPONENTS PROTECTED SECURITY METHODS
Authentication
4. Operating System Password Policy
User Accounts
File/Folder Permissions
5. Data Files
Access Monitoring
DATA INTEGRITY
DATA INTEGRITY
SECURITY POLICY
Set of rules that protects & organizations assets.
THREE TYPES:
General or Enterprise
Issue-Specific
System-Specific
INCIDENT RESPONSE PLANNING
WHAT IS AN INCIDENT?
If action threatens information & completed.
CHARACTERISTICS:
Directed against information assets.
Realistics change of success.
Threaten the confidentiality, integrity or availability of info.
INCIDENT RESPONSE
Set of activities taken to plan for detect and correct the impact.
INCIDENT PLANNING
Requires understanding BIA scenarios.
Develop series of predefined responses.
Enables org to react quickly.
INCIDENT RESPONSE
INCIDENT DETECTION
POSSIBLE INDICATORS
PROBABLE INDICATORS
DEFINITE INDICATORS
PREDEFINED SITUATION
Loss of availability
Loss of integrity
Loss of confidentiality
Violation of policy
Vialation of law
INCIDENT REACTION