Data And System Security

Read Complete Research Material

DATA AND SYSTEM SECURITY

Data and System Security

Data and System Security

Introduction

The software demo that I will be discussing about is SAP Crystal Server 2011. It is software that delivers the reasonable essentials of (BI) business intelligence which helps in enabling the access to the reports of information to self-service, data search, dashboards and the explorations. The various changes that have been appeared in this software designing are critically discussed below.

Discussion

Database Security contains two meanings: the first layer is the system is running security system safe operation of the usual threats are as follows, network criminals through a network, LAN, and other ways through the invasion of the computer system does not start properly, or overload the machine running a large number of algorithms, and turn off the CPU fan, CPU overheating burn and other destructive activities.

Some information or data are very important for us, for e.g. billing data management, police department control, financial records and statistics, banking department data and so on. This data can be sniffed or corrupted by some criminal minds. We cannot afford to lose it at any cost, as the changes or corruption in the data can make us a huge loss. So the decision has been made regarding the security of the database and many solutions till now has been given to satisfy this need. We also need to keep data independence, data security, recovery, data integrity, concurrency control and options in mind.

The second layer is the information systems security, system security is usually the threats are as follows hacker intrusion on the database, and steal the information you want. Database system security features for data, including data independence, data security, data integrity, concurrency control, fault recovery. Management system is responsible to avoid concurrent access to the database. This registration also contains information relevant to the recovery of the database, if a failure thereof or a system crash. Although this mechanism does not prevent unauthorized access, is a deterrent to potential attackers, allowing also found weaknesses in security mechanisms. In addition to all these mechanisms, the physical medium that is stored on the database may be protected cryptographically. Also backups can these well defended against attacks.

New tools and Learning from them:

There are various new features that are being introduced in the new version of the software. This module provides new installation features of 2011 SP 4 and provides completely new features along with fixes in 2011 FP 3. This software is yet a new approach to the management along with the business of sharing information. The server is faster and easier in use and is comparatively comprehensive than it has been ever before. There are many key features that it has introduced in this new version, which are;

Guided Data Exploration

The Crystal server 2011 gives business objects of SAP, the Explorer software which provide guidance to the data exploration. People of the organization can now access the information without taking help from the IT department and find the answers to their ...