Download Chapter VIII data and database Information security

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Extensible Storage Engine wikipedia , lookup

Concurrency control wikipedia , lookup

Microsoft Jet Database Engine wikipedia , lookup

Database wikipedia , lookup

Relational model wikipedia , lookup

Clusterpoint wikipedia , lookup

Object-relational impedance mismatch wikipedia , lookup

Database model wikipedia , lookup

Transcript
Chapter VIII
data and database
Information security
File fundamentals
Database fundamentals
Malware and computer security
Dr. Nazih Abdallah - Modern business computer
1
Lecture objectives
• Understand file creation, naming and saving
• Understand database and database structure
• Understand the use of database.
• Understand database query and manipulation
• Be able to compare database approach to file approach in business
management
• Be aware of threats targeting information and computer network.
• Understand backup policy
Dr. Nazih Abdallah - Modern business computer
2
File fundamentals
• A file is the smallest named collection of data/information or
instructions stored on a storage medium.
• A file must have a name before being saved.
• File name must be descriptive to indicate the content of the file and
must abide by the following criteria:
• Maximum length shouldn’t exceed 255 characters
• Avoid prohibited characters *?”/I><:\
• Case sensitive: “A” and “a” are different characters in the file name.
• The file name must end with an extension that is related to the
format used when the file was saved. (.txt, .doc, .gif, .xls, etc…)
• File name extension cannot exceed 3 characters.
• Operating system can be set to hide the file name extension
• Native file format is format used when we create the file: Example (if
we use MS word to create a document then we save the document as
a pdf file its native file format will be .doc and its filename extension
will be .pdf)
Dr. Nazih Abdallah - Modern business computer
3
Types of files
• Program file or software file:
• consists of software instructions designed to instruct the computer how to perform
specific applications
• an application may consist of one or several programs
• all program files are saved on the hard disk in a folder called “program files” folder
which is the default folder used by the operating system to store software programs
including the ones that you download from the WEB.
• Program file can be ASCII text file that needs conversion to binary or binary executable
file that don’t need any conversion.
• Data files:
• Files that hold data/information of all types
• No instructions included in data files.
• Content vary from text to document to multimedia (pictures, audio, video, etc…)
Dr. Nazih Abdallah - Modern business computer
4
Physical storage Model
• Each storage medium is formatted and divided into sectors (CD has one single track about 3
miles long: 336000 sectors of 2048 bytes each 336000 x 2048 = about 700 megabytes
• The smallest storage location is not the sector but the cluster
• A cluster is formed of several contiguous sectors.
• Operating system stores each record of a saved file in an available cluster and gives it a flag
and order number in the corresponding file.
• Consequently, a given file has its records dispersed all over the storage medium
• Operating system maintain a list of addresses of files in a FAT (File Allocation Table) that
serves like the occupancy board at the entrance of office buildings.
• Defragmentation utility brings same file records as close to each other as possible
• The FAT addressing technology helps the operating system to retrieve the file when we want
them to be displayed.
• NTFS (New Technology File System) and HPFS (High Performance File System) and IFS
(Installable File System) are newer more advanced technologies than FAT which is still used
because of its effectiveness
Dr. Nazih Abdallah - Modern business computer
5
Logical storage model
• The operating system creates a directory for each storage medium and
maintain an addressing table for all files stored on that directory
• The directory is considered to be the logical storage model that
identifies the path to each file thru directories and subdirectories.
• This logical storage model is like a tree metaphor that consists of:
• Root directory: The storage medium depicted as the trunk of the
tree. Example for the hard disk (C:\)
• Subdirectories: considered as the folders and subfolders depicted as
the branches.
• Files depicted as the leaves
• Example: C:\electronics\computers\notebook\apple.xls
• The above example in computer store represents the path of the
available apple notebooks excel file stored in the notebook
subfolder which is stored in the computer subfolder which is also
stored in the electronic folder on the hard disk.
Dr. Nazih Abdallah - Modern business computer
6
File management software
windows explorer – Mac finder
allows you to manipulate files and folders in the following
ways:
• Rename: Change the name use (Save as)
• Copy: make a copy of the file so you can paste it in
another location
• Move: You can move the file from its actual location to
another and change its logical storage model
accordingly.
• Delete: Move the file to the recycle bin folder
Dr. Nazih Abdallah - Modern business computer
7
MOVE/DELETE files
• When you move a file from one location to another all
its bits stay where they were until they are overwritten
by other files.
• Only the status of the corresponding clusters will be
turned from occupied to vacant so they will be reused by
the Operating system.
• When you delete a file, you in fact, are moving it to the
recycle bin folder where it will stay and can be retrieved
as long as that folder is not emptied or overloaded.
• File shredder is software that overwrites the old file
ASCII code using random zeroes and ones.
Dr. Nazih Abdallah - Modern business computer
8
Database fundamentals
• A database is a collection of related data files that consists of
all data/information of a business or organization.
• Database files are also called tables or relations because they
are tables similar to spreadsheet files.
• If the number of files in a business or organization is too big,
which is usually the case in big businesses, then several
databases will be necessary and a data warehouse is created
which consists of a collection of several related databases.
• A small data warehouse is known as a data-mart.
• Creation and manipulation of database is not possible
without a powerful software known as DBMS (Database
management software). MS Access is a database
management system.
Dr. Nazih Abdallah - Modern business computer
9
Functions of DBMS
• Helps create the database files or projects
• Helps manipulate the database: update information, add new
information delete and all necessary operations.
• Sort data based on given criteria.
• Provides interface between the user and the database thru 2
applications;
• Front end application interface between the user like the forms
and direct links provided by the application
• Back end application interacts with program and applications of
the database that are used by the users.
• Prepare routine tasks using available data:
• Paychecks for employees
• Issue letters and labels and other promotional material.
• Tax forms
• Client and supplier accounts
• Etc…
Dr. Nazih Abdallah - Modern business computer
10
Functions of DBMS
• Help decision makers with the decision process by
providing reports and statistics needed for that
purpose.
• Provide for possibility to query the database by
authorized people in order to get needed information
and data.
• Help in enhancing data security by protecting data
from intruders, attacks and all unauthorized queries.
Dr. Nazih Abdallah - Modern business computer
11
Database structure
• Field: is the building bloc of the database and its data. It is the
smallest data element that must have well defined characteristics:
•
•
•
•
Length: how many characters and if it is fixed or variable.
Type: Alpha, numeral, decimal, currency, date, etc…
Never store last name and first name in the same field.
Each part of the name must have its own field. Example the name Dr. Maya N.
Abdallah Jr. must be stored in 5 fields.
• Each data element that fits in a field is known as the field attribute.
Dr. Nazih Abdallah - Modern business computer
12
Database structure
• Record:
• The record is a collection of related fields.
• If the number of fields is too big the record will be very bulky
and we may need to create another record and consequently
another file.
• Table or relation
• The file in a database is known as table or relation.
• It consists of a collection of many related records
• Files in the database have relationships necessary to extract all
information we need from different files.
• Each table, regardless of its size, is composed of:
• One record type which consists of the record template of all
the labels of the record.
• A number of record occurrences equal to the number of the
population of the file
Dr. Nazih Abdallah - Modern business computer
13
Database structure
• Database is a collection of related files used as a
centralized homogeneous source of data/information
used by many users in a business and is very flexible to
allow the following procedures:
• Collect and store data
• Update data
• Organize and output data
• Find and analyze data
Dr. Nazih Abdallah - Modern business computer
14
Database structure
Database structure is depicted in the following database sample
of a department store where the database is composed of 5
tables as follow: Clients, Suppliers, Employees, Inventory, Sales
Employees file has a sample depicted in the table below:
ID #
Last name
First name
suffix
Department #
Date of hire
123456
Smith
Ted
Sr
22
050508
456789
Rogers
Bill
19
022599
157157
Salam
Ziad
18
031608
989898
Jolie
Raya
22
111210
Jr.
Dr. Nazih Abdallah - Modern business computer
15
KEYS
• Database manipulation and data retrieval from a database
will not be possible without a key that identify data and
information stored into the database.
• There are two types of keys;
• The primary key: which is a field unique to each record (PID, SSN,
ID#, etc…) database designer must be very careful when defining
primary keys especially for inventory items.
• Secondary key: May be any other field of the file.
• In the sample file above:
• ID# is the primary key that is unique to each employee (it is
not possible that 2 employees get the same ID# in the same
business)
• All other fields of the record type may be used as secondary
keys used when needed to extract information. Example: We
may use the date of hire as key to get a list of all employees
that were hired in 2008 for example.
Dr. Nazih Abdallah - Modern business computer
16
Database relationship
One to one
supps
prods
supps
prods
supps
prods
One to many
Many to many
Dr. Nazih Abdallah - Modern business computer
17
Data warehouse
• A data warehouse is a collection of related databases that
include all databases in multidimensional establishment.
• A small data warehouse is known as data-mart.
• They can be depicted as a cube shape where each cut
represents a separate
Market
product
Sales person
Dr. Nazih Abdallah - Modern business computer
18
Database operations
• Normalization: process of eliminating redundant data
which results in reducing the size of the database.
• Selection: process of selecting from the database
records that meet given criteria. Example clients whose
accounts payables exceed $ 5000.
• Joining table: to shrink the number of tables or files in a
database we may join 2 or more tables together to form
one table.
• Query database: SQL (Structured Query Language) is
used in forms that are converted into queries by the
DBMS. Example: grade form on CGS2100 website.
Dr. Nazih Abdallah - Modern business computer
19
SQL (Structured Query Language)
• SQL used keywords are:
• CREATE
• DELETE
• INSERT
• JOIN
• SET
• SELECT
• UPDATE
• Example: SELECT 32” TV FROM electronics Where TV Brand = Sony
• SQL also allows the use of logical operators: AND, OR, NOT
• The grade form on the course website: When you fill and submit it will be
converted into SQL to select your grade page from the grades database.
Dr. Nazih Abdallah - Modern business computer
20
User interface
• Forms are the most used user interface they should be
designed carefully to make it user friendly as much as
possible. Forms must be:
• Fields arranged in a logical order
• Boxes areas should be clear, visible and consistent with
data to fill
• Provide easy samples with instructions about the filling
of data.
Dr. Nazih Abdallah - Modern business computer
21
OODB (Object oriented database
• Data is stored as objects that are grouped into classes and subclasses
• OODB is reusable and portable because:
• Functions and application methods are defined with each object and
can be reused by all subclasses.
• You only need to add your special parameters and the model will work
for you if you belong to the same class activity.
• Example: If transportation network is an object: there are general
functions and attributes that are valid for all kind of transportation
classes:
• Air transportation
• Water transportation
• Ground transportation
• In Ground transportation there are general functions and attribute
that are valid for all forms of ground transportation
• We don’t have to start always from scratch when building a
database
• OODBMS (Object Oriented Database Management System) is needed to
manipulate the OODB
• Access can manipulate all types of databases including OODB.
Dr. Nazih Abdallah - Modern business computer
22
File approach
• File approach: each department will create and maintain its own files
• Strengths:
• More security
• Limited and clear responsibility
• Close knowledge of the subject matter of data/information
• Weaknesses:
•
•
•
•
•
Redundancy: same record is repeated in many departments.
Limited involvement in the general business picture
No or limited networking possibility
No cooperation between all business department
Poor quality reports and decision making information tool.
Dr. Nazih Abdallah - Modern business computer
23
Database approach
• Strengths:
• No redundancy
• Centralized source of same information among all
departments
• Networking heaven because of database server
that will be able to provide information to all
clients
• Security is enhanced thru strict central policy and
limited people are manipulating the database.
• Much better quality report and customer and
supplier service.
Dr. Nazih Abdallah - Modern business computer
24
The Changing Face of Crime
• Corporate and government networks are under attack,
and the Internet is the battlefield
• Many types of attacks can be made on computer
systems
• Malware: Viruses, worms and Trojan horses
• Identity theft
• Theft of personal information
• Unauthorized use of other’s computer
• Information security involves
• Confidentiality, integrity, availability
Viruses and Worms
• Virus
• Program that attaches itself to a file
• Spreads to other files, and delivers a destructive action called a payload
• Time bomb: Virus that delivers payload on a specific time (birthday of
celebrity, anniversary of an incident, etc…)
• Logic bomb: delivers payload on specific conditions (click a link, open a
file, boot, etc…)
• Trojan horses
• Appear to be harmless programs
• When they run, they install programs on the computer that can be
harmful
• Backdoor Trojans open ports on the computer for hackers access.
• Worm : Acts as a free agent, replicating itself numerous times in an effort
to overwhelm systems causing denial of service attack on a network (traffic
jam).
• War driving: Driving through neighborhoods with a wireless notebook
or handheld computer looking for unsecured Wi-Fi networks.
26
Defending Against Viruses and
Worms
• Antivirus software uses several techniques to:
• Find viruses: 2 steps:
• Detect the virus presence using Checksum of the file.
• Checksum is the actual number of bytes in the file saved by the AV software and compared
to the new number. If the numbers are different there should be a virus.
• Find the identity of the virus by comparing its signature to the available list of virus
signatures.
• AV then removes them if possible or quarantine them until they can be
removed.
• Keep additional viruses from infecting the system
27
Information Security and
Vulnerability
• Organizational
information
• Compromised information can lead to
• Loss of market share
• Business failure
• Business intelligence
• Process of gathering information in the pursuit of business
advantage
• Competitive intelligence
• Concerned with information about competitors
• Counterintelligence
• Concerned with protecting your own information from access by
your competitors
28
National and Global Security
• Cyber-terrorism
• Uses attacks over the Internet to intimidate or harm a
population
• United States Computer Emergency Readiness Team
(US-CERT)
• Monitors the security of US networks and the Internet
• Responds to attacks
• National Strategy to Secure Cyberspace
• Prevent cyber-attacks against US infrastructure
• Reduce national vulnerability to cyber-rattack
• Minimize damage and recovery time
29
Threats to Information Security:
Software and Network Vulnerabilities
• Security vulnerabilities or security holes
• Software bugs that allow violations of information security
• Software patches
• Corrections to software bugs that cause security holes
30
Threats to Information Security:
Hackers, Crackers, Intruders, and Attackers
• System penetration: Someone subverting the security of a system without
authorization
• Hackers, crackers, intruders, and attackers
• Hackers convene every year in Las Vegas the convention is nicknamed HOPE
(Hackers On Planet Earth): Media, businesses and government specialists
attend the convention to be aware of new hacking and security advances .
• White-hat hacker: No criminal intention, Don’t make money
• THEY MAY BE HIRED BY BUSINESSES TO CHECK AND CONSOLIDATE
THEIR NETWORK SECURITY (in this case they make legally money).
• Black-hat hacker: Criminal intention, make money (cracker).
• Gray-hat hacker: Can be either one
• Script kiddie: Try to gain access to a network using scripts of other hackers.
• Computer forensics
• Process of examining computer equipment to determine if it has been used
for illegal, unauthorized, or unusual activities
31
ZOMBIE computer
A computer that carries out actions (often malicious)
under the remote control of a hacker either directly
or through spyware or a virus is called a zombie
computer.
Zombie computers can join together to form zombie
networks (botnet). Zombie networks apply the
power of multiple PCs to overwhelm Web sites with
distributed denial-of-service attacks, to crack
complicated security codes, or to generate huge
batches of spam.
Dr. Nazih Abdallah - Modern business computer
32
Machine-Level Security
• Common forms of authentication
• Something you know
• Password or personal identification number (PIN)
• Something you have
• ID cards, smartcards, badges, keys,
• Something about you
• Unique physical characteristics such as fingerprints
33
ID Devices and Biometrics
• Biometrics
• The science and technology of authentication by scanning
and measuring a person’s unique physical features
• Facial pattern recognition
• Uses mathematical technique to measure the distances
between 128 points on the face
• Retinal scanning
• Analyzes the pattern of blood vessels at the back of the
eye
• Fingerprint scan
• Increasingly common method for access to secure areas,
logging onto computers, and even validating credit
34
Encrypting Stored Data
• Encryption
• Uses high-level mathematical functions and computer algorithms to encode
data
• Files
• Can be encrypted “on the fly” as they are being saved, and decrypted as they
are opened
• Encryption and decryption
• Tend to slow down computer slightly when opening and saving files
35
Backing up Data Files
• Backup software typically provides the following
options
• Select the files and folders you wish to back up
• Choose the location to store the archive file
• Choose whether to back up all files (a full backup), or just those
that have changed since the last backup (an incremental
backup)
• Mirroring
• Creating a copy of the system or a portion of it
• Real-time mirroring
• As files are saved, they are automatically updated in the
mirrored copy
36
Scams, Spam, Fraud, and Hoaxes
• Virus hoaxes
• E-mail that warns of a virus that doesn’t exist
• In some cases, just a nuisance, but they can cause great harm in
other cases
• Hoax may ask you to delete a “virus” file that is actually an uninfected,
important system file
• Deleting such a file may make your computer unusable
37
Scams, Spam, Fraud, and Hoaxes
• Virus hoaxes
• E-mail that warns of a virus that doesn’t exist
• In some cases, just a nuisance, but they can cause great harm in
other cases
• Hoax may ask you to delete a “virus” file that is actually an uninfected,
important system file
• Deleting such a file may make your computer unusable
38
Scams, Spam, Fraud, and Hoaxes
• Spam solutions
•
•
•
•
•
Bayesian filters
Simple authentication software
“Trusted sender” technology
Reputation systems
Interfaces for client-side tools to allow end users to report spam
39
Scams, Spam, Fraud, and Hoaxes
• Defending against scams, spam, fraud, and hoaxes
• Awareness and common sense
• Do not click links sent by e-mail
• Type URLs directly into the browser
• Examine Web addresses to make sure they are legitimate
• Do not believe virus alerts sent through e-mail unless they come from a
reputable source
• Use spam filters
40