Académique Documents
Professionnel Documents
Culture Documents
1
Telemarketing is a form of direct marketing in which a consultant using
the phone, tablets, laptop or any other means of communication to contact
potential customers and market products and services. Potential customers are
identified and classified by various means such as purchase history, previous
surveys, contest entries or job applications ( especially through Internet).
2
The word cracker refers to people breaking a security system. The
crackers may be motivated by a multitude of reasons, including for-profit,
protest, or the challenge.
Jornada de Investigacin, Desarrollo Socio Productivo y Vinculacin Social del Departamento de Informtica, 2015
Universidad Politcnica Territorial del estado Aragua, Domnguez Chvez Jorge. Principios bsicos de seguridad...
A.
The administrator of the database
Is the central authority that controls a system of this type. The
DBA4 has a privileged account in the DBMS, sometimes
called system account, which gives extraordinary abilities not
available to ordinary users accounts and database. The DBA
performs the following types of actions:
Account creation.
Granting privileges.
Revocation of privileges.
2.
3.
4.
5.
Database systems.
Operative System.
Network.
Phisycal.
Human.
THE USERS 7.
Database administrator.
Root is a user account that has full control of everything that happens in a
system.
6
MariaDB is a direct fork of MySQL which ensures that it will remain a
version of this product with GPL.
5
7
According to the Royal Spanish Academy (dictionary), a user is " one who
uses something " or " something that ordinarily uses."
Jornada de Investigacin, Desarrollo Socio Productivo y Vinculacin Social del Departamento de Informtica, 2015
Universidad Politcnica Territorial del estado Aragua, Domnguez Chvez Jorge. Principios bsicos de seguridad...
IV.
It is a virtual relationship.
The user will not know that there are those attributes that are
omitted to define a view.
V.
Encryption.
Jornada de Investigacin, Desarrollo Socio Productivo y Vinculacin Social del Departamento de Informtica, 2015
Universidad Politcnica Territorial del estado Aragua, Domnguez Chvez Jorge. Principios bsicos de seguridad...
was published two years later. Subsequently published SHA- 2
in 2001 (consisting of several functions: SHA -224, SHA -256,
SHA -384 and SHA -512) and the most recent, SHA -3. This
latest version is notable for being the most different from their
predecessors.
A.
Creating accounts.
2.
Granting privileges.
3.
Withdrawal of privileges.
4.
The mandatory security mechanisms impose multilevel security and classifying data users in several adhoc levels and then implementing appropriate
security policy of the organization.
ACCESS TO DATABASE
Universidad Politcnica Territorial del estado Aragua, Domnguez Chvez Jorge. Principios bsicos de seguridad...
C.
Closed: Only authorized accesses are explicitly
allowed. See next figure below.
VII.
Safety Practices
Jornada de Investigacin, Desarrollo Socio Productivo y Vinculacin Social del Departamento de Informtica, 2015
Universidad Politcnica Territorial del estado Aragua, Domnguez Chvez Jorge. Principios bsicos de seguridad...
Dynamic monitoring is also an essential element of
vulnerability assessment, allows you to go beyond static or
forensic evaluations. A classic example see it when multiple
users share privileged credentials or an excessive number of
logins database.
F.
Audit Trails
Apply generate audit trails and traceability of activities that
affect data integrity or viewing sensitive data.
Remember it is an audit requirement, and is also important for
forensic investigations.
Most organizations today use some form of manual auditing of
transactions or native applications of management systems
databases. However, these applications are often deactivated
due to:
complexity
performance problems
H.
http://www.iso.org/iso/catalogue_detailcsnumber=39
612
3.
4.
5.
6.
7.
8.
http://sox.sourceforge.net/
9.
References
1.
2.
Jornada de Investigacin, Desarrollo Socio Productivo y Vinculacin Social del Departamento de Informtica, 2015