StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Database Systems Concepts - Essay Example

Cite this document
Summary
Cryptography is not an easy science, to say the least. One of the major problems is that access has an inherent tradeoff with security. To make it easy to unlock my locks so as to facilitate communication means less secure locks or more keys, both of which are non-secure…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.6% of users find it useful
Database Systems Concepts
Read Text Preview

Extract of sample "Database Systems Concepts"

Download file to see previous pages

One of the principles of cryptography is double-blind design: Make it so as few people as possible have access to both key and lock. In this case, the solution is to have the administrator encrypt the passwords as well as improve security through mechanisms like further password-encrypting the password folder, making the password folder a hidden folder and providing no information as to find it, having user logs, etc. The best and simplest way is to encrypt the passwords in the first place. When a user enters a password, it is turned into dots or *****.

This is to prevent onlookers from seeing it. But it is possible for that process to occur and for the password to still be saved in plain text elsewhere. When one signs up for a forum, it is quite often that one's plain text password is sent to the person in an e-mail. This would mean that any trojan that could read e-mails could easily acquire the person's password for a site. Solving that problem is certainly slightly stickier, but when it comes to an OS, it's very easy. When the password is signed in, it is encrypted locally.

This encryption needs to be chosen by the administrator. Only administration has access to the encryption algorithm, so only the administrator can log onto a computer and find passwords. That way, if a breach does occur and someone does find the password folder, they see gibberish. Ideally, user names should be encoded as well. What about password retrieval? Use password hint services. Upon signing up for the password, the user also creates some unique security questions. These should be unique enough so as to avoid potential social engineering approaches: The classic “What is your mother's maiden name” or “Who was your first pet” can be risky.

The best approach is to let the user type in their own question then answer it. However, this program will have to make sure that the password is not in the text at all, else people give themselves backdoors which can compromise security. If this fails, then administration can log people in and recall passwords. Other basic security tricks can solve this problem, however. The password folder should always be hidden and password-protected itself by a password known only to the admin. This means that even if someone had a key to the encryption for the passwords, they still couldn't access the password list.

And they would find it difficult to locate the password folder in the first place. Similarly, user logs of who logs in and out at various times is a deterrent to this activity. If only legitimate users can log on, then it is easy to find who did it and pursue disciplinary action. The problem comes when a password is stolen from one person by another employee or someone else with access to the company, but at the least, it starts the investigation appropriately. However, it is important to bear in mind that in the modern era it's rarely someone breaking into an office and stealing passwords, or even some intrepid employee doing so.

Rather, the most likely risk are keyloggers, trojans and malware that seek out the information. Again, if the information is sufficiently encrypted, there is no problem; however, this means that the key should only be stored locally on the administrator computer, if it is stored locally at all (I would suggest keeping it in a CD-ROM). This means that proper anti-spyware programs and hygiene are key to avoid password theft problems. Ideally, administrators would sharply control what can be run and what can't be run. When

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Database Systems Concepts Essay Example | Topics and Well Written Essays - 750 words - 3”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1408214-database-systems-concepts
(Database Systems Concepts Essay Example | Topics and Well Written Essays - 750 Words - 3)
https://studentshare.org/environmental-studies/1408214-database-systems-concepts.
“Database Systems Concepts Essay Example | Topics and Well Written Essays - 750 Words - 3”, n.d. https://studentshare.org/environmental-studies/1408214-database-systems-concepts.
  • Cited: 0 times

CHECK THESE SAMPLES OF Database Systems Concepts

Object Database Management System

Object database management systems added the notion of persistence to object programming languages.... This is essentially a way of understanding a system in terms of those components and characteristics that are common to all systems.... We use the term system here in a very specific sense; although one that has much broader application than just computer systems.... But in general systems theory, a system is rather more than just anything that shows a degree of organization....
8 Pages (2000 words) Essay

Database Design Proposal

This proposal aims at designing a database for a health organization.... Therefore, a database system that keeps proper track of all the activities of the facility is necessary.... The tool used for the database management will be SQL.... From this scenario, it is obvious that the database needed to safeguard information of the health center must be efficient.... This means that the same data could be stored severally in different platforms of the organization's database....
3 Pages (750 words) Article

Database Security

The paper "database Security" states that generally, database security needs stem from the requirement to protect data.... The DBMSs provide an interface that enables users to interact with the database itself, other applications for capturing and analyzing data (Oppel, 2004).... database security is concerned with aspects aimed at protecting the contents of the database, users and owners.... The protection ranges from system protection against software and hardware malfunction to intentional and unauthorized use of the database and unintentional access by entities not authorized....
12 Pages (3000 words) Coursework

Management Decision Support Systems

It further aims to reflect on the development of models and analytical concepts for use of DSS in e-commerce platform.... Decision Support systems (DSS) have gradually developed as computer based interactive systems that help users in effectively communicating, sharing of data and essential documents and also the needed knowledge to help in solving potential problems.... The Decision Support systems… DSS are required to be considered as essential support systems in decision making activities....
15 Pages (3750 words) Essay

How Are Program Libraries Concatenated

In the paper “How Are Program Libraries Concatenated?... rdquo; the author analyzes a definition for ISF panels that are stored in the PDS.... The program libraries are concatenated using different types of statements, which comprise of three forms of statements, that is, DD, JOB, and EXEC....
8 Pages (2000 words) Assignment

The Concept and Benefits of the Database System

The concept and benefits of the database system are explained with a detailed analysis of the commercial and non-commercial purposes … Exposure to a case study has finalized the database concepts that are required in a business scenario to capture the information and make good of all the aligning features and technologies provided by the database management systems in order to learn and master the concepts for future benefits to emerge as a database designer   Optimization of queries is done to access multi-dimensional data....
20 Pages (5000 words) Essay

Managing Information for Competitive Advantages

In order to manage these information organizations have developed information systems.... Today there are several information systems such as MIS, DSS, and ESS which help managers to make more appropriate and efficient decisions for their organizations.... In organizational context information system refers to the systems of keeping a record of all the data, computer technologies for processing those data and people involved in the whole process....
8 Pages (2000 words) Research Paper

Advanced Database Systems

This paper "Advanced database systems" discusses some legal and ethical issues that need to be considered when introducing a distributed database system.... Moreover, the term of the distributed database system (DDBS) is normally utilized to state both distributed database systems as well as distributed database management system.... Normally, a distributed database is a group of data divided into the different divisions under the management of disconnected database management systems (DBMSs) executing on autonomous computer platforms or systems....
10 Pages (2500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us