Friday, April 6th
Min Day Schedule 8:30 - 9:35

 

Chapter 7 Database Exam

Complete any missing DB assignments

Begin reviewing for ITGS exams - use the ITGS guide as your check off list for topics.
ITGS Exam information

 

Homework

Have a great week off!

 

What

1.2 Security
Security refers to the protection of hardware, software, machines and networks from unauthorized access.
Security measures include restricted access to machines and networks for certain employees or to prevent
access by hackers. The degree of security of information systems largely determines society’s confidence in
the information contained in the systems.

1.5 Authenticity
Authenticity means establishing a user’s identity beyond reasonable doubt. Authenticating the user is
crucial in many scenarios, particularly in business and legal matters. A simple example of authentication is
a user login to a network. A more advanced example would be the use of encrypted digital signatures in a
business transaction or the use of watermarking on digital photographs.

Network administration
• Electronic security: for example, authorized access, levels of access, biometrics, login, password,
firewalls, proxy server, encryption, secure socket layer (SSL), audit trails

Internet threats and security
• Internet security: for example, firewall, proxy server, SSL (secure sockets layer), encryption, public and
private keys, digital signatures
• Internet threats: for example, global viruses, hackers, spam, phishing, pharming, spyware, adware

 

Why

Databases lie at the heart of most IT systems whether in businesses, organizations or other institutions.

 

How

By completing the DB questions