Você está na página 1de 2

Access Controls and Backup Controls

ACCESS CONTROLS:
-prevent individual from viewing,retrieving, corrupting or destroying the
entitys data
1. Users view or subschema: DBA and system designers
2. Database authorization table: limit the action of users
3. User-defined procedures: create personal security
4. Data Encryption: secret code for storage
5.Biometric devices: personal characteristics as identification
6. Inference Controls: prevents users from inferring through query features
-positive compromise
-negative compromise
-approximate compromise
-limit related consecutive queries
-not displaying if the query contains one value
AUDIT PROCEDURES
-Responsibility for authority tables and subschema
-Appropriate access authority
-Biometrics control
-Inference Control
-Encryption Controls
*BACKUP CONTROLS: retrieval of data
In Flat File: *GPC- use in sequential file batch system

1. financial significant
2. degree of file activity
*Direct access file backup: copy before updating
*Real-time Processing system
*Batch Processing system
AUDIT PROCEDURES:
1. GPC: backups are appropriate
2. backups to recover data ay tingnan
3. det. which data is backup first b4 update and vice versa
In database: *Backup
*Transaction Log
*Checkpoint feature
*Recovery Module
AUDIT PROCEDURES:
1. Alamin kung may consistent backup

Você também pode gostar