Professional Documents
Culture Documents
Presented By:
Radostina Georgieva
Master of Science
Faculty Advisor/Mentor:
Prof. Barbara Nicolai
•Integrity
C.I.A. Triangle
Database Security Access Points
SA,
SA, developers,
developers, data
data entry
entry employees,
employees, clients,
clients, suppliers,
suppliers, volunteers
volunteers (People)
(People)
Data
Data collection
collection and
and reporting
reporting screens
screens (Applications)
(Applications)
Method
Method of
of connection
connection to
to the
the reporting
reporting screens
screens (Network)
(Network)
Microsoft
Microsoft Windows
Windows Server
Server 2003
2003 (Operating
(Operating System)
System)
SQL
SQL Server
Server 2008
2008 (DBMS)
(DBMS)
Files
Files storing
storing information
information about
about clients,
clients, transactions,
transactions, products,
products, orders,
orders, disaster
disaster specifics
specifics (Data
(Data Files)
Files)
Information
Information processes
processes and/or
and/or stored
stored in
in the
the system
system (Data)
(Data)
Database
Database Security
Security
Conclusion
• Applied security is efficient for the moment
• Compliance with regulations
• Protect sensitive information
Future Work
• Continuous update and maintenance for the
existing system
• Regular audits
• Security updates
Acknowledgements
THANK YOU!