Databases Reference
In-Depth Information
W
-
.
This
includes all the traditional issues facing databases and applications, as well
as the threat of constant access from many unknown users at any time of
the day from virtually any position on the planet. With so many potential
security risks and points of failure, it is a necessity for the data architecture
of a Web-based solution to incorporate security mechanisms from the start
of the development cycle, with regular reviews to ensure its effectiveness
on an ongoing basis. This section contains the following chapters.
EB
BASED
APPLICATIONS
SUFFER
FROM
MANY
SECURITY
EXPOSURES
Chapter 54, “Security Management for the World Wide Web,” provides a
solution set to leverage an organization's existing skills, resources, and
security implementations in building an underlying baseline security
framework for transacting corporate business over the Internet and the
World Wide Web.
Chapter 55, “Establishing Security Controls in a Distributed Database,”
provides a detailed analysis of information security issues in the distrib-
uted database environment. Recommendations for establishing and imple-
menting effective security controls are also provided.
Chapter 56, “Understanding Relational Databases and Assessing Their
Security,” is a primer to evaluate discretionary controls and sophisticated
multilevel secure databases.
Chapter 57, “Virus Protection in a Web Environment,” examines tech-
niques for protecting Web-based applications against virus infiltration from
a variety of sources.
Search WWH ::




Custom Search