Database Security Management – it is the process in securing your data and the user file itself
Mechanisms providing data security
Data Encryption
Strong User Authentication
Auditing
Backup Solutions
Data Encryption – mechanism of adding values to a saved password
Strong User Authentication – the mechanism which limits the number of logins an authorized user may have.
Auditing – one of the vital programs that is always injected in every database or application that uses a database management system
Backup Solutions – the mechanism that allows you to backup or save a copy of the database in another offline storage media location
Username – is the unique name assigned to every user for their login security credentials
Password – is an alphanumeric key that a user will use to secure his/her credentials
Asterisk – are used as the default masking key to prevent someone from seeing the password
Guidelines that you must consider in setting up your password:
Does not contain the Account Name of the User
At least 8 characters long
Contains characters from the following 4 categories: a. Uppercase letters (A-Z) b. Lowercase letters (a-z) c. Base 10 digits (0-9) d. Non-alphanumeric characters (!, @, #, $, %, &, *, (, )
Hackers - are people who break into computer systems for various reasons, such as stealing data, installing malware, or disrupting service.
Hacking - is an illegal act of identifying and then exploiting weaknesses in a computer system or network, usually to gain unauthorized access to personal or organizational data.
Backup – is a duplicate copy of data into another location, drive or folder
Restoration – the process of restoring or retrieving data when there is power interruption
Example of a login page:
The 6 Different Types of Hackers:
Black Hat Hackers
White Hat Hackers
Grey Hat Hackers
Red Hat Hackers
Blue Hat Hackers
Green Hat Hackers
Black Hat Hackers - Bad hackers who use cyber attacks to gain money or to achieve another agenda.
White Hat Hackers - Ethical hackers who protect your system from black hat hackers.
Grey Hat Hackers - Hackers who cruise the line between being good and bad. Penetrate systems without permission but typically don't cause harm.
Red Hat Hackers - Hackers who use cyber attack to attack black hat hackers.
Blue Hat Hackers - Hackers who seek to take personal revenge, or outside security professionals that companies hire to test new software & other products to find vulnerabilities prior to release.
Green Hat Hackers - Newbie hackers who are learning to hack.
Parts of MS ACCESS:
A) Object-type
B) Objects
C) Navigation pane
D) Open Objects
E) Ribbon
F) Close Object
G) Status bar
H) Quick Access Toolbar
Green Hat Hackers - They're often not aware of the consequences of their actions & cause unintentional damage without knowing how to fix it.
Grey Hat Hackers - Draw attention to vulnerabilities and often offer a solution to patch them by charging fees.
Red Hat Hackers - Their intentions are noble, but these hackers often take unethical or illegal routes to take down bad hackers.
White Hat Hackers - Penetrate the system with the owner's permission to find and fix security vulnerabilities and mitigate cyberattacks.
Black Hat Hackers - These hackers penetrate systems without permission to exploit known or zero-dav vulnerabilities.
<img/> short for image, used to display image on a page
<br/> short for break, used to display breaks on a page
<p/> used to display paragraph
is used to create space/spacing between
MouseClick is the event when the mouse is clicked
OnLoad is the event occurs when the form is activated in code by the user
DoubleClick is the event when the mouse is clicked twice
FALSE - Closed is the event when the form is opened