System Security
The protection of computer based
resources that includes hardware, software, data, procedures and people against
unauthorized use or natural
Disaster is known as System
Security.
System Security can be divided into
four related issues:
- Security
- Integrity
- Privacy
- Confidentiality
SYSTEM SECURITY refers to the technical innovations
and procedures applied to the hardware and operation systems to protect against
deliberate or accidental damage from a defined threat.
DATA SECURITY is the protection of data from
loss, disclosure, modification and destruction.
SYSTEM INTEGRITY refers to the power functioning of
hardware and programs, appropriate physical security and safety against
external threats such as eavesdropping and wiretapping.
PRIVACY defines the rights of the user or
organizations to determine what information they are willing to share with or
accept from others and how the organization can be protected against unwelcome,
unfair or excessive dissemination of information about it.
CONFIDENTIALITY is a special status given to
sensitive information in a database to minimize the possible invasion of
privacy. It is an attribute of information that characterizes its need for
protection.
SECURITY IN SOFTWARE:
System security refers to various
validations on data in form of checks and controls to avoid the system from
failing. It is always important to ensure that only valid data is entered and
only valid operations are performed on the system. The system employees two
types of checks and controls i.e
CLIENT SIDE VALIDATION:
Various client side validations are
used to ensure on the client side that only valid data is entered. Client side
validation saves server time and load to handle invalid data. Some checks
imposed are
·
JavaScript
in used to ensure those required fields are filled with suitable data only.
Maximum lengths of the fields of the forms are appropriately defined.
·
Forms
cannot be submitted without filling up the mandatory data so that manual
mistakes of submitting empty fields that are mandatory can be sorted out at the
client side to save the server time and load.
·
Tab-indexes
are set according to the need and taking into account the ease of user while
working with the system.
SERVER
SIDE VALIDATION:
Some checks cannot be applied at
client side. Server side checks are necessary to save the system from failing
and intimating the user that some invalid operation has been performed or the
performed operation is restricted. Some of the server side checks imposed is
·
Server
side constraint has been imposed to check for the validity of primary key and
foreign key. A primary key value cannot be duplicated. Any attempt to duplicate
the primary value results into a message intimating the user about those values
through the forms using foreign key can be updated only of the existing foreign
key values.
·
User
is intimating through appropriate messages about the successful operations or
exceptions occurring at server side.
·
Various
Access Control Mechanisms have been built so that one user may not agitate upon
another. Access permissions to various types of users are controlled according
to the organizational structure. Only permitted users can log on to the system
and can have access according to their category. User- name, passwords and
permissions are controlled o the server side.
·
Using
server side validation, constraints on several restricted operations are
imposed.
0 comments:
Post a Comment