Data Management and Security

Cards (38)

  • Database Security Management – it is the process in securing your data and the user file itself
  • Mechanisms providing data security
    • Data Encryption
    • Strong User Authentication
    • Auditing
    • Backup Solutions
  • Data Encryption – mechanism of adding values to a saved password
  • Strong User Authentication – the mechanism which limits the number of logins an authorized user may have.
  • Auditing – one of the vital programs that is always injected in every database or application that uses a database management system
  • Backup Solutions – the mechanism that allows you to backup or save a copy of the database in another offline storage media location
  • Username – is the unique name assigned to every user for their login security credentials
  • Password – is an alphanumeric key that a user will use to secure his/her credentials
  • Asterisk – are used as the default masking key to prevent someone from seeing the password
  • Guidelines that you must consider in setting up your password:
    1. Does not contain the Account Name of the User
    2. At least 8 characters long
    3. Contains characters from the following 4 categories: a. Uppercase letters (A-Z) b. Lowercase letters (a-z) c. Base 10 digits (0-9) d. Non-alphanumeric characters (!, @, #, $, %, &, *, (, )
  • Hackers - are people who break into computer systems for various reasons, such as stealing data, installing malware, or disrupting service.
  • Hacking - is an illegal act of identifying and then exploiting weaknesses in a computer system or network, usually to gain unauthorized access to personal or organizational data.
  • Backup – is a duplicate copy of data into another location, drive or folder
  • Restoration – the process of restoring or retrieving data when there is power interruption
  • Example of a login page:
  • The 6 Different Types of Hackers:
    1. Black Hat Hackers
    2. White Hat Hackers
    3. Grey Hat Hackers
    4. Red Hat Hackers
    5. Blue Hat Hackers
    6. Green Hat Hackers
  • Black Hat Hackers - Bad hackers who use cyber attacks to gain money or to achieve another agenda.
  • White Hat Hackers - Ethical hackers who protect your system from black hat hackers.
  • Grey Hat Hackers - Hackers who cruise the line between being good and bad. Penetrate systems without permission but typically don't cause harm.
  • Red Hat Hackers - Hackers who use cyber attack to attack black hat hackers.
  • Blue Hat Hackers - Hackers who seek to take personal revenge, or outside security professionals that companies hire to test new software & other products to find vulnerabilities prior to release.
  • Green Hat Hackers - Newbie hackers who are learning to hack.
  • Parts of MS ACCESS:
    A) Object-type
    B) Objects
    C) Navigation pane
    D) Open Objects
    E) Ribbon
    F) Close Object
    G) Status bar
    H) Quick Access Toolbar
  • Green Hat Hackers - They're often not aware of the consequences of their actions & cause unintentional damage without knowing how to fix it.
  • Grey Hat Hackers - Draw attention to vulnerabilities and often offer a solution to patch them by charging fees.
  • Red Hat Hackers - Their intentions are noble, but these hackers often take unethical or illegal routes to take down bad hackers.
  • White Hat Hackers - Penetrate the system with the owner's permission to find and fix security vulnerabilities and mitigate cyberattacks.
  • Black Hat Hackers - These hackers penetrate systems without permission to exploit known or zero-dav vulnerabilities.
  • <img/> short for image, used to display image on a page
  • <br/> short for break, used to display breaks on a page
  • <p/> used to display paragraph
  • &nbsp; is used to create space/spacing between
  • MouseClick is the event when the mouse is clicked
  • OnLoad is the event occurs when the form is activated in code by the user
  • DoubleClick is the event when the mouse is clicked twice
  • FALSE - Closed is the event when the form is opened
  • MDI stands for Multiple Document Interface
  • <h1> stands for heading text used for headings