SlideShare a Scribd company logo
PROPOSAL ON IMPLEMENTING AN 
IMPROVED SECURITY FOR COLLIN’s 
DATABASE AND TELECOMMUTERS
INTRODUCTION 
o The computer has become more of an everyday necessity in our personal world to 
communicate with other people and in our business world to help make the creation of 
advance documents, drawings, and storing the information. With this advancement of 
technology there has been an increased need for internet and file security. More 
businesses have developed a need for a fast and efficient way of transmitting information 
for various purposes within their business. With the increased use of the computer, there 
is a huge concern that the information that they have stored will be retrieved and misused. 
o Thus, it is essential that companies incorporate security measures so users both within the 
company and outside the company do not obtain, change, and even destroy the data that 
is maintained on their database. 
o Some of the threats for telecommuting are; computer viruses, password hacking, 
man-in middle attacks, identity theft, and social engineering. To overcome these threats, 
telecommuters and businesses need firewall protection, strong encryption, good 
authentication methods and anti-virus software. 
o COLLINS is a state agency that is in charge of maintaining safety for the public 
transportation system. COLLINS gathers and stores confidential information such as 
employee and client information. Therefore, the use of many security measures must be 
maintained and regulated so that unauthorized users are unable to gain access.
AIM: 
The agency aims at implementing the best security 
measures to maximize performance and Web security 
for telecommuters thus ensuring better security of 
data stored in the database server and improving the 
overall database design. 
STATEMENT OF PURPOSE: 
To make the database a more secure 
environment and to implement a combination 
of security measures that includes audit trails, 
database patches, IDS, firewalls
OBJECTIVE 
• To ensure better security of data stored 
in the database server, improve the 
overall database design 
• To entail techniques of proper 
encryption, firewalls, and to enhance the 
overall performance of COLLIN’s 
database.
RISK ANALYSIS 
• To consider when implementing security to the database is 
that multiple entry points are available to the database 
information for employees and business partners. The 
difficulty that is associated with ensuring each of these lines 
are secure is the complexity of the system itself changes as 
the company grows. 
• It is very crucial when implementing a firewall, the 
corporation has to decide how the firewall screens traffic and 
develops the firewall to accept or deny the incoming traffic to 
the system. 
• Network sniffers try to steal information as it is transmitted 
through the network from the client to the application server. 
Once they gain access to the information, they will misuse it. 
•
METHODOLOGY 
• Methods as installing fire wall, setting up 
isolation region for protected resource, 
encrypting 
• the sensitive information being stored and 
transmitted, providing identity authentication 
• and building secret passage, providing digital 
signature for audit and tracking to software 
• without any security guarantee are adopted 
to ensure Web service security.
1. INSTALL FIRE WALL 
The most popular security method is providing an isolation 
region to LAN or website. Fire wall of LAN is a function 
module inside computer or network equipments between 
innernet and Internet. Its purpose is to provide security 
protection to an innernet or host and control access 
objects, so it can also called access control technology. 
There are two operation mechanisms for fire wall e.g. 
packet filtering and agency. Packet filtering aims at the 
service provided by host of special IP address. Its basic 
principle is to intercept and capture IP packet of IP layer in 
network transmission, then find out resource address and 
destination address, source port and destination port of IP 
packet. Whether to transmit IP packet is based on fixed 
filtering principle. Agent is achieved in the application 
layer, the basic principle is to construct an independent 
agent program for Web services, and client program and 
the server can only exchange.
2. Encryption for Confidential Information 
This method is particularly effective to protect confidential 
information, which can prevent wiretapping and hacking. 
Transmission encryption in Web services is in general 
achieved in the application layer. When WWW server sends 
confidential information, firstly, it selects keys to encrypt the 
information, based on the receiver's IP address or other 
identification; After browser receives the encrypted data, it 
decrypts the encrypted data according to source address or 
other identification of the information in IP packet to get the 
required data. In addition, transmission, encryption and 
decryption of information at the IP layer also can be achieved 
by encrypting and decrypting the whole message to ensure 
information security at the network layer.
3. Provide Identity Authentication for the Client / Server 
Communication and Establish A 
Secure Channel 
Currently some network security protocols e.g. SSL and PCT have appeared, which are 
based on the existing network protocol. These two protocols are mainly used for not 
only protecting confidential information but also preventing other unauthorized users 
to invade their own host. SSL protocol is a private communication and includes 
technology of authentication, signature, encryption for the server, which can not only 
provide authentication for the server but also provide authentication for the client 
according to the options of the server. www.intechopen.com8 Security Enhanced 
Applications for Information Systems SSL protocol can run on any kind of reliable 
communication protocols, e.g. TCP, and can also run in application protocols e.g. 
HTTP, FTP, Telnet etc. SSL protocol uses X.509 V3 certification standards, RSA, Diffie- 
Hellman and the Fortezza-KEA as its public key algorithm and uses the RC4-128, RC- 
128, DES, 3-layer DWS or IDEA as its data encryption algorithm. The authentication 
scheme and encryption algorithm provided by PCT are more abundant than SSL, and it 
makes improvements in some details of the agreement. IPSec protocol is used to 
provide end to end encryption and authentication services for public and private 
networks. It specifies all kinds of optional network security services, and the 
organizations can integrate and match these services according to their own security 
policy.
4. Digital Signatures for the Software 
Many large companies use digital signature technology for their 
software, and claim that they are responsible for the security of their 
software, especially e.g. Java applets, ActiveX controls, which will bring 
risks to Web services. Digital signatures are based on public key 
algorithms, using their private key to sign its own released software, 
and are authenticated by using the public key. Microsoft's 
Authenticode technology is used to identify a software publisher and 
prove that it has not been damaged. Authenticode is software for 
client, which monitors the ActiveX control, Cab files, Java applets, or 
download of executable file, and look for the digital certificate to 
verify in these files, and then show warning words, the certificate 
organization's name and other information to the user for possible 
security problems. Digital signature can protect the integrity of the 
software, and it is sensitive to illegal change of the software in the 
transfer process
BUDGET 
Personal Firewall Products: 
•McAfee Internet Security Suite www.mcfee.com $49.99 - 
$69.99 Windows 
•Norton Internet Security 2011 www.symantec.com $69.99 - 
$99.9 Windows 
•ZoneAlarm Internet Security Suite 6 www.zonelabs.com 
$49.95 Windows 
•Trend Micro PC-cillin Internet Security 2011 
www.trendmicro.com $49.95 - 124.95 Windows 
•Smooth Wall www.smoothwall.org, Free ,Linux 
•Sygate Personal Firewall www.sygate.com, Free ,Windows 
•Tiny Firewall www.tinysofware.com ,Free ,Windows 
Total Budget :$375.95
BENEFITS 
• First line of defense: Transparently detect and 
block SQL injection attacks, privilege 
escalation, and other threats. 
• Faster response: Automatically detect 
unauthorized database activities that violate 
security policies, and thwart perpetrators 
from covering their tracks 
• Simplified compliance reporting: Easily 
analyze audit and event data and take action 
in a timely fashion with out-of-the-box 
compliance reports.
CONCLUSION AND RECOMMENDATIONS 
Also, as a telecommuter, the companies should 
recommend providing their employees with the best 
firewalls available to their employees working outside the 
office. The best software is the one which serves business 
needs and is based on the network infrastructure and 
business environment. Personal firewalls are designed in 
such a way that it is easy to install and operate, and can 
significantly reduce the risk of intrusion. The rationale of 
having a firewall is to keep out hackers and permit or 
deny certain traffic in/out of the network. The firewall is 
one of the building blocks of a well-designed security 
structure.
Ad

More Related Content

What's hot (20)

Topic11
Topic11Topic11
Topic11
Anne Starr
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
Nawanan Theera-Ampornpunt
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3
Mukesh Chinta
 
презентация1
презентация1презентация1
презентация1
sagidullaa01
 
Network security
Network securityNetwork security
Network security
mena kaheel
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Jiunn-Jer Sun
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
Stefano Maria De' Rossi
 
GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014
Ravindran Vasu
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
Art Ocain
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
backdoor
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
Online
 
Cyber secure
Cyber secure Cyber secure
Cyber secure
Gaurav Sachdeva
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Edureka!
 
Cybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity lawsCybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity laws
Bryan Len
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
Mukesh Chinta
 
SOC-as-a-Service - comSpark 2019
SOC-as-a-Service - comSpark 2019SOC-as-a-Service - comSpark 2019
SOC-as-a-Service - comSpark 2019
Advanced Technology Consulting (ATC)
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
NetstarterSL
 
Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing Lab
Syed Ubaid Ali Jafri
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
BeyondTrust
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
Altaware, Inc.
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3
Mukesh Chinta
 
презентация1
презентация1презентация1
презентация1
sagidullaa01
 
Network security
Network securityNetwork security
Network security
mena kaheel
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Jiunn-Jer Sun
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
Stefano Maria De' Rossi
 
GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014
Ravindran Vasu
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
Art Ocain
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
backdoor
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
Online
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Edureka!
 
Cybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity lawsCybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity laws
Bryan Len
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
Mukesh Chinta
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
NetstarterSL
 
Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing Lab
Syed Ubaid Ali Jafri
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
BeyondTrust
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
Altaware, Inc.
 

Viewers also liked (18)

SUPERPHONES
SUPERPHONESSUPERPHONES
SUPERPHONES
Rishabh Gupta
 
“WIRELESS TILT MOUSE” -using XBEE module
“WIRELESS TILT MOUSE”-using XBEE module“WIRELESS TILT MOUSE”-using XBEE module
“WIRELESS TILT MOUSE” -using XBEE module
Rishabh Gupta
 
ujian praktik kejuruan
ujian praktik kejuruanujian praktik kejuruan
ujian praktik kejuruan
Yogi25
 
Buddy navigator
Buddy navigatorBuddy navigator
Buddy navigator
Rishabh Gupta
 
Web development
Web developmentWeb development
Web development
Rishabh Gupta
 
tugas 2
tugas 2tugas 2
tugas 2
Yogi25
 
Gis Application
Gis ApplicationGis Application
Gis Application
Rishabh Gupta
 
Google Glasses
Google GlassesGoogle Glasses
Google Glasses
Rishabh Gupta
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Rishabh Gupta
 
E learning website
E  learning websiteE  learning website
E learning website
Rishabh Gupta
 
Installment of database management system
Installment of database management systemInstallment of database management system
Installment of database management system
Rishabh Gupta
 
A Proposal on Bio Gas Plants for villages
A Proposal on Bio Gas Plants for villagesA Proposal on Bio Gas Plants for villages
A Proposal on Bio Gas Plants for villages
Rishabh Gupta
 
Big data
Big dataBig data
Big data
Rishabh Gupta
 
Security protection On banking systems using ethical hacking.
Security protection  On banking systems using  ethical hacking.Security protection  On banking systems using  ethical hacking.
Security protection On banking systems using ethical hacking.
Rishabh Gupta
 
Event management
Event managementEvent management
Event management
Xillion Telecom Private Limited
 
Sucker Rod Pump (SRP)
Sucker Rod Pump (SRP)Sucker Rod Pump (SRP)
Sucker Rod Pump (SRP)
Rakesh Kumar
 
Security in Android Application
Security in Android ApplicationSecurity in Android Application
Security in Android Application
Rishabh Gupta
 
Xillion Telecom Pvt. Ltd
Xillion Telecom Pvt. LtdXillion Telecom Pvt. Ltd
Xillion Telecom Pvt. Ltd
Xillion Telecom Private Limited
 
“WIRELESS TILT MOUSE” -using XBEE module
“WIRELESS TILT MOUSE”-using XBEE module“WIRELESS TILT MOUSE”-using XBEE module
“WIRELESS TILT MOUSE” -using XBEE module
Rishabh Gupta
 
ujian praktik kejuruan
ujian praktik kejuruanujian praktik kejuruan
ujian praktik kejuruan
Yogi25
 
tugas 2
tugas 2tugas 2
tugas 2
Yogi25
 
Installment of database management system
Installment of database management systemInstallment of database management system
Installment of database management system
Rishabh Gupta
 
A Proposal on Bio Gas Plants for villages
A Proposal on Bio Gas Plants for villagesA Proposal on Bio Gas Plants for villages
A Proposal on Bio Gas Plants for villages
Rishabh Gupta
 
Security protection On banking systems using ethical hacking.
Security protection  On banking systems using  ethical hacking.Security protection  On banking systems using  ethical hacking.
Security protection On banking systems using ethical hacking.
Rishabh Gupta
 
Sucker Rod Pump (SRP)
Sucker Rod Pump (SRP)Sucker Rod Pump (SRP)
Sucker Rod Pump (SRP)
Rakesh Kumar
 
Security in Android Application
Security in Android ApplicationSecurity in Android Application
Security in Android Application
Rishabh Gupta
 
Ad

Similar to Implementing an improved security for collin’s database and telecommuters (20)

Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
Divyank Jindal
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
SofiyaKhan49
 
Internet security
Internet securityInternet security
Internet security
Tapan Khilar
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
Robert Parker
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
Leif Davidsen
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation
Nikec Solutions
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
RushikeshChikane2
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
Pyingkodi Maran
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
Brianna Johnson
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
Universitas Bina Darma Palembang
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
DEEPAK948083
 
Cyber Security and Data Privacy - presentation
Cyber Security and Data Privacy - presentationCyber Security and Data Privacy - presentation
Cyber Security and Data Privacy - presentation
noorebrahim2002
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 
Securing E-Commerce Networks Presentation.ppt
Securing E-Commerce Networks Presentation.pptSecuring E-Commerce Networks Presentation.ppt
Securing E-Commerce Networks Presentation.ppt
anshikagoel52
 
Network security
Network securityNetwork security
Network security
Ravikumar Natarajan
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
sahil lalwani
 
Computer Security Essentials.pptx
 Computer Security Essentials.pptx Computer Security Essentials.pptx
Computer Security Essentials.pptx
Guna Dhondwad
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
Intelligentia IT Systems Pvt. Ltd.
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Identive
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
Tejaswi Agarwal
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
Divyank Jindal
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
SofiyaKhan49
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
Robert Parker
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
Leif Davidsen
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation
Nikec Solutions
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
RushikeshChikane2
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
Brianna Johnson
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
DEEPAK948083
 
Cyber Security and Data Privacy - presentation
Cyber Security and Data Privacy - presentationCyber Security and Data Privacy - presentation
Cyber Security and Data Privacy - presentation
noorebrahim2002
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 
Securing E-Commerce Networks Presentation.ppt
Securing E-Commerce Networks Presentation.pptSecuring E-Commerce Networks Presentation.ppt
Securing E-Commerce Networks Presentation.ppt
anshikagoel52
 
Computer Security Essentials.pptx
 Computer Security Essentials.pptx Computer Security Essentials.pptx
Computer Security Essentials.pptx
Guna Dhondwad
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Identive
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
Tejaswi Agarwal
 
Ad

Recently uploaded (20)

Autodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User InterfaceAutodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User Interface
Atif Razi
 
MODULE 03 - CLOUD COMPUTING- [BIS 613D] 2022 scheme.pptx
MODULE 03 - CLOUD COMPUTING-  [BIS 613D] 2022 scheme.pptxMODULE 03 - CLOUD COMPUTING-  [BIS 613D] 2022 scheme.pptx
MODULE 03 - CLOUD COMPUTING- [BIS 613D] 2022 scheme.pptx
Alvas Institute of Engineering and technology, Moodabidri
 
Evonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdfEvonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdf
szhang13
 
Compiler Design_Code Optimization tech.pptx
Compiler Design_Code Optimization tech.pptxCompiler Design_Code Optimization tech.pptx
Compiler Design_Code Optimization tech.pptx
RushaliDeshmukh2
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
Resistance measurement and cfd test on darpa subboff model
Resistance measurement and cfd test on darpa subboff modelResistance measurement and cfd test on darpa subboff model
Resistance measurement and cfd test on darpa subboff model
INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
Main cotrol jdbjbdcnxbjbjzjjjcjicbjxbcjcxbjcxb
Main cotrol jdbjbdcnxbjbjzjjjcjicbjxbcjcxbjcxbMain cotrol jdbjbdcnxbjbjzjjjcjicbjxbcjcxbjcxb
Main cotrol jdbjbdcnxbjbjzjjjcjicbjxbcjcxbjcxb
SunilSingh610661
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
Introduction to FLUID MECHANICS & KINEMATICS
Introduction to FLUID MECHANICS &  KINEMATICSIntroduction to FLUID MECHANICS &  KINEMATICS
Introduction to FLUID MECHANICS & KINEMATICS
narayanaswamygdas
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
Compiler Design_Code generation techniques.pptx
Compiler Design_Code generation techniques.pptxCompiler Design_Code generation techniques.pptx
Compiler Design_Code generation techniques.pptx
RushaliDeshmukh2
 
Compiler Design_Syntax Directed Translation.pptx
Compiler Design_Syntax Directed Translation.pptxCompiler Design_Syntax Directed Translation.pptx
Compiler Design_Syntax Directed Translation.pptx
RushaliDeshmukh2
 
Reese McCrary_ The Role of Perseverance in Engineering Success.pdf
Reese McCrary_ The Role of Perseverance in Engineering Success.pdfReese McCrary_ The Role of Perseverance in Engineering Success.pdf
Reese McCrary_ The Role of Perseverance in Engineering Success.pdf
Reese McCrary
 
ISO 9001 quality management systemPPT.pptx
ISO 9001 quality management systemPPT.pptxISO 9001 quality management systemPPT.pptx
ISO 9001 quality management systemPPT.pptx
mesfin608
 
Routing Riverdale - A New Bus Connection
Routing Riverdale - A New Bus ConnectionRouting Riverdale - A New Bus Connection
Routing Riverdale - A New Bus Connection
jzb7232
 
COMPUTER GRAPHICS AND VISUALIZATION :MODULE-1 notes [BCG402-CG&V].pdf
COMPUTER GRAPHICS AND VISUALIZATION :MODULE-1 notes [BCG402-CG&V].pdfCOMPUTER GRAPHICS AND VISUALIZATION :MODULE-1 notes [BCG402-CG&V].pdf
COMPUTER GRAPHICS AND VISUALIZATION :MODULE-1 notes [BCG402-CG&V].pdf
Alvas Institute of Engineering and technology, Moodabidri
 
2025 Apply BTech CEC .docx
2025 Apply BTech CEC                 .docx2025 Apply BTech CEC                 .docx
2025 Apply BTech CEC .docx
tusharmanagementquot
 
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
Novel Plug Flow Reactor with Recycle For Growth Control
Novel Plug Flow Reactor with Recycle For Growth ControlNovel Plug Flow Reactor with Recycle For Growth Control
Novel Plug Flow Reactor with Recycle For Growth Control
Chris Harding
 
Autodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User InterfaceAutodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User Interface
Atif Razi
 
Evonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdfEvonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdf
szhang13
 
Compiler Design_Code Optimization tech.pptx
Compiler Design_Code Optimization tech.pptxCompiler Design_Code Optimization tech.pptx
Compiler Design_Code Optimization tech.pptx
RushaliDeshmukh2
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
Main cotrol jdbjbdcnxbjbjzjjjcjicbjxbcjcxbjcxb
Main cotrol jdbjbdcnxbjbjzjjjcjicbjxbcjcxbjcxbMain cotrol jdbjbdcnxbjbjzjjjcjicbjxbcjcxbjcxb
Main cotrol jdbjbdcnxbjbjzjjjcjicbjxbcjcxbjcxb
SunilSingh610661
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
Introduction to FLUID MECHANICS & KINEMATICS
Introduction to FLUID MECHANICS &  KINEMATICSIntroduction to FLUID MECHANICS &  KINEMATICS
Introduction to FLUID MECHANICS & KINEMATICS
narayanaswamygdas
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
Compiler Design_Code generation techniques.pptx
Compiler Design_Code generation techniques.pptxCompiler Design_Code generation techniques.pptx
Compiler Design_Code generation techniques.pptx
RushaliDeshmukh2
 
Compiler Design_Syntax Directed Translation.pptx
Compiler Design_Syntax Directed Translation.pptxCompiler Design_Syntax Directed Translation.pptx
Compiler Design_Syntax Directed Translation.pptx
RushaliDeshmukh2
 
Reese McCrary_ The Role of Perseverance in Engineering Success.pdf
Reese McCrary_ The Role of Perseverance in Engineering Success.pdfReese McCrary_ The Role of Perseverance in Engineering Success.pdf
Reese McCrary_ The Role of Perseverance in Engineering Success.pdf
Reese McCrary
 
ISO 9001 quality management systemPPT.pptx
ISO 9001 quality management systemPPT.pptxISO 9001 quality management systemPPT.pptx
ISO 9001 quality management systemPPT.pptx
mesfin608
 
Routing Riverdale - A New Bus Connection
Routing Riverdale - A New Bus ConnectionRouting Riverdale - A New Bus Connection
Routing Riverdale - A New Bus Connection
jzb7232
 
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
Novel Plug Flow Reactor with Recycle For Growth Control
Novel Plug Flow Reactor with Recycle For Growth ControlNovel Plug Flow Reactor with Recycle For Growth Control
Novel Plug Flow Reactor with Recycle For Growth Control
Chris Harding
 

Implementing an improved security for collin’s database and telecommuters

  • 1. PROPOSAL ON IMPLEMENTING AN IMPROVED SECURITY FOR COLLIN’s DATABASE AND TELECOMMUTERS
  • 2. INTRODUCTION o The computer has become more of an everyday necessity in our personal world to communicate with other people and in our business world to help make the creation of advance documents, drawings, and storing the information. With this advancement of technology there has been an increased need for internet and file security. More businesses have developed a need for a fast and efficient way of transmitting information for various purposes within their business. With the increased use of the computer, there is a huge concern that the information that they have stored will be retrieved and misused. o Thus, it is essential that companies incorporate security measures so users both within the company and outside the company do not obtain, change, and even destroy the data that is maintained on their database. o Some of the threats for telecommuting are; computer viruses, password hacking, man-in middle attacks, identity theft, and social engineering. To overcome these threats, telecommuters and businesses need firewall protection, strong encryption, good authentication methods and anti-virus software. o COLLINS is a state agency that is in charge of maintaining safety for the public transportation system. COLLINS gathers and stores confidential information such as employee and client information. Therefore, the use of many security measures must be maintained and regulated so that unauthorized users are unable to gain access.
  • 3. AIM: The agency aims at implementing the best security measures to maximize performance and Web security for telecommuters thus ensuring better security of data stored in the database server and improving the overall database design. STATEMENT OF PURPOSE: To make the database a more secure environment and to implement a combination of security measures that includes audit trails, database patches, IDS, firewalls
  • 4. OBJECTIVE • To ensure better security of data stored in the database server, improve the overall database design • To entail techniques of proper encryption, firewalls, and to enhance the overall performance of COLLIN’s database.
  • 5. RISK ANALYSIS • To consider when implementing security to the database is that multiple entry points are available to the database information for employees and business partners. The difficulty that is associated with ensuring each of these lines are secure is the complexity of the system itself changes as the company grows. • It is very crucial when implementing a firewall, the corporation has to decide how the firewall screens traffic and develops the firewall to accept or deny the incoming traffic to the system. • Network sniffers try to steal information as it is transmitted through the network from the client to the application server. Once they gain access to the information, they will misuse it. •
  • 6. METHODOLOGY • Methods as installing fire wall, setting up isolation region for protected resource, encrypting • the sensitive information being stored and transmitted, providing identity authentication • and building secret passage, providing digital signature for audit and tracking to software • without any security guarantee are adopted to ensure Web service security.
  • 7. 1. INSTALL FIRE WALL The most popular security method is providing an isolation region to LAN or website. Fire wall of LAN is a function module inside computer or network equipments between innernet and Internet. Its purpose is to provide security protection to an innernet or host and control access objects, so it can also called access control technology. There are two operation mechanisms for fire wall e.g. packet filtering and agency. Packet filtering aims at the service provided by host of special IP address. Its basic principle is to intercept and capture IP packet of IP layer in network transmission, then find out resource address and destination address, source port and destination port of IP packet. Whether to transmit IP packet is based on fixed filtering principle. Agent is achieved in the application layer, the basic principle is to construct an independent agent program for Web services, and client program and the server can only exchange.
  • 8. 2. Encryption for Confidential Information This method is particularly effective to protect confidential information, which can prevent wiretapping and hacking. Transmission encryption in Web services is in general achieved in the application layer. When WWW server sends confidential information, firstly, it selects keys to encrypt the information, based on the receiver's IP address or other identification; After browser receives the encrypted data, it decrypts the encrypted data according to source address or other identification of the information in IP packet to get the required data. In addition, transmission, encryption and decryption of information at the IP layer also can be achieved by encrypting and decrypting the whole message to ensure information security at the network layer.
  • 9. 3. Provide Identity Authentication for the Client / Server Communication and Establish A Secure Channel Currently some network security protocols e.g. SSL and PCT have appeared, which are based on the existing network protocol. These two protocols are mainly used for not only protecting confidential information but also preventing other unauthorized users to invade their own host. SSL protocol is a private communication and includes technology of authentication, signature, encryption for the server, which can not only provide authentication for the server but also provide authentication for the client according to the options of the server. www.intechopen.com8 Security Enhanced Applications for Information Systems SSL protocol can run on any kind of reliable communication protocols, e.g. TCP, and can also run in application protocols e.g. HTTP, FTP, Telnet etc. SSL protocol uses X.509 V3 certification standards, RSA, Diffie- Hellman and the Fortezza-KEA as its public key algorithm and uses the RC4-128, RC- 128, DES, 3-layer DWS or IDEA as its data encryption algorithm. The authentication scheme and encryption algorithm provided by PCT are more abundant than SSL, and it makes improvements in some details of the agreement. IPSec protocol is used to provide end to end encryption and authentication services for public and private networks. It specifies all kinds of optional network security services, and the organizations can integrate and match these services according to their own security policy.
  • 10. 4. Digital Signatures for the Software Many large companies use digital signature technology for their software, and claim that they are responsible for the security of their software, especially e.g. Java applets, ActiveX controls, which will bring risks to Web services. Digital signatures are based on public key algorithms, using their private key to sign its own released software, and are authenticated by using the public key. Microsoft's Authenticode technology is used to identify a software publisher and prove that it has not been damaged. Authenticode is software for client, which monitors the ActiveX control, Cab files, Java applets, or download of executable file, and look for the digital certificate to verify in these files, and then show warning words, the certificate organization's name and other information to the user for possible security problems. Digital signature can protect the integrity of the software, and it is sensitive to illegal change of the software in the transfer process
  • 11. BUDGET Personal Firewall Products: •McAfee Internet Security Suite www.mcfee.com $49.99 - $69.99 Windows •Norton Internet Security 2011 www.symantec.com $69.99 - $99.9 Windows •ZoneAlarm Internet Security Suite 6 www.zonelabs.com $49.95 Windows •Trend Micro PC-cillin Internet Security 2011 www.trendmicro.com $49.95 - 124.95 Windows •Smooth Wall www.smoothwall.org, Free ,Linux •Sygate Personal Firewall www.sygate.com, Free ,Windows •Tiny Firewall www.tinysofware.com ,Free ,Windows Total Budget :$375.95
  • 12. BENEFITS • First line of defense: Transparently detect and block SQL injection attacks, privilege escalation, and other threats. • Faster response: Automatically detect unauthorized database activities that violate security policies, and thwart perpetrators from covering their tracks • Simplified compliance reporting: Easily analyze audit and event data and take action in a timely fashion with out-of-the-box compliance reports.
  • 13. CONCLUSION AND RECOMMENDATIONS Also, as a telecommuter, the companies should recommend providing their employees with the best firewalls available to their employees working outside the office. The best software is the one which serves business needs and is based on the network infrastructure and business environment. Personal firewalls are designed in such a way that it is easy to install and operate, and can significantly reduce the risk of intrusion. The rationale of having a firewall is to keep out hackers and permit or deny certain traffic in/out of the network. The firewall is one of the building blocks of a well-designed security structure.