{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Chap challenge handshake authentication protocol n

Info iconThis preview shows pages 5–6. Sign up to view the full content.

View Full Document Right Arrow Icon
CHAP – Challenge Handshake Authentication Protocol n Supports encryption, protects password Decentralized Relational Database Security n Relational Databases support queries n Object oriented databases do not support queries Relational Database n Data structures called tables (relations) n Integrity Rules on allowable values n Operators on the data in tables Persistency – preservation of integrity through the use of nonvolatile storage media Schema n Description of the database n Defined by Data Description Layer (DDL) Database Management System (DBMS) n provides access to the database n Allows restriction of access Relational Database n Relation (table) is the basis of a relational database – relation is represented by a table n Rows = Records (tuples) n Column = Attributes Attribute-1 Attribute-2 Attribute-3 Record-1 Record-2 Primary Key n Unambiguously identifies a record. Points to a record (tuple) n Every row (record, tuple) must contain the primary key of the relation (table) Cardinality - # of rows in a relationship (table) Degree - # of columns in a relationship (table) Candidate key - any identifier that is a unique to the record Foreign Key – any value that matches the primary key of another relation (table) Relational Database – best suited for text Relational Database Operations n Select – based on criteria i.e. all items with value > $300.00 n Join - join tables based on a common value n Union – forms a new relation (table) from two other relations n View – (virtual table) uses join, project, select - Views can be used to restrict access (least privileges) n Query plan n Comprised of implementation procedures, lowest cost plan based on “cost” n Costs are CPU time, Disk Access n Bind – used to create plan
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Data Normalization Ensures that attributes in a table rely only on the primary key n Eliminates repeating groups n Eliminates redundant data n Eliminates attributes not dependent on the primary key SQL – Structured Query Language n Select n Update n Delete n Insert n Grant – Access Privileges n Revoke – Access Privileges Object Oriented Databases - OODB n Best suited for multi-media, graphics n Steep learning curve n High overhead Intrusion Detection Network Based n Real Time n Passive Host Based n System and event logs n Limited by log capabilities Signature Based – (Knowledge Based) n Signatures of an attack are stored and referenced n Failure to recognize slow attacks n Must have signature stored to identify Statistical Anomaly Based (Behavior Based) n IDS determines “normal” usage profile using statistical samples n Detects anomaly from the normal profile Access Control Issues n Confidentiality n Integrity n Availability n Accountability of users Measures for compensating for both internal and external access violations n Backups n RAID – Redundant Array of Inexpensive Disks n Fault Tolerance n Business Continuity Planning n Insurance
Background image of page 6
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page5 / 6

CHAP Challenge Handshake Authentication Protocol n Supports...

This preview shows document pages 5 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon bookmark
Ask a homework question - tutors are online