Syllabus
Schedule
Reading
Discussion
Project
Test
Resource
Tip

Summary of
Chapter
1 Security Architecture


  1. Security is defined as the level and degree free from danger and threats.
  2. Database security can be briefly as the degree to which data is fully protected from unauthorized tampering.
  3. Information systems are the backbone of the day-to-day company operations as well as the guide for long-term strategies.
  4. A typical information system consists of data, procedures, hardware, software, networks and people.
  5. A client/server application is based on the business relationship in which the customer requests an order or service and the server responds to the request.
  6. A tier is a logical or physical platform in client/server architecture.
  7. DBMS from different vendors vary in distinct implementation and architecture but they have close to the same functionality.
  8. The basic function of DBMS is to enable developers and administrators to organize data; store manipulate, and retrieve data efficiently; enforce data referential integrity; and provide a security mechanism to protect the data.
  9. Most companies employ an information security department to protect data and information.
  10. The concepts of information security is based on C.I.A triangle
  11. There are two components to confidentiality: preventing unauthorized individuals from knowing or accessing secretive information, and keeping confidential information secret by not disclosing it to unauthorized individuals.
  12. Data is considered to have integrity if it is accurate and has not been intentionally or unintentionally tampered with .
  13. System availability is measured by now accessible the system is to individual who are to access information and how free individuals are to manipulate data.
  14. Database environment components are people, applications, networks, operating system based management system, data files, and finally data.
  15. Data is the most asset of the database environment.
  16. An access point is a gateway that requires measures to limit database secirty violation
  17. A security access point is a point where security measure are needed to prevent access authorized action.
  18. Vulnerability is defined as being susceptible to attack.
  19. A threat is defined as an indication of implementation danger to harm.
  20. A security risk is a result of a threat, which is a result of vulnerability.
  21. Information security architecture is a model for protecting logical and physical assets.
  22. Information security architecture is the overall design of a company implementation of C.I.A triangle.
  23. Components of information security architecture include policies and procedures, secure personal and administrators, detection equipment, security programs, monitoring equal monitoring applications, and auditing procedures and tools.
  24. Database management system empower the database administrator to implement any security at all levels of the database.
  25. The security access points are people, applications, networks, operating system, DBM and data.