Monday, April 3rd
Collaboration Schedule

 

Print up and turn in your homework.

Database Systems Exam will be Friday.

Complete Database Queries 2007 part 2 - get this checked off today.

Begin Database Forms - making data entry easier and limiting access to data

Complete Importing Data

Complete Producing Reports - making your data presentable

Complete any missing DB assignments.

Exam Review - use the chapter review in the green book as a starting point to prepare for the DB exam.

Exporting/Importing Database Data, CSV files
Normalization - part of the design process for creating a DB
SQL - the universal language of databases
DBMS, Data validation, Specialized databases - Google and BigTable, Database security (IC security?)

Big Data Analytics

Andy Yen: Think your email's private? Think again


 

Homework

No news article due this week since you will be taking the DB exam Friday.

Criterion B Feedback - can redo for full credit - print up updated page and attach to feedback page. All resubmissions are due by Wednesday.

Review Database chapter for exam Friday.
Complete Chapter 7 on-line study guide, email me (send a copy to yourself as well) the results once you get 100%.

 

What

1.2 Security
Security refers to the protection of hardware, software, machines and networks from unauthorized access.
Security measures include restricted access to machines and networks for certain employees or to prevent
access by hackers. The degree of security of information systems largely determines society’s confidence in
the information contained in the systems.

1.5 Authenticity
Authenticity means establishing a user’s identity beyond reasonable doubt. Authenticating the user is
crucial in many scenarios, particularly in business and legal matters. A simple example of authentication is
a user login to a network. A more advanced example would be the use of encrypted digital signatures in a
business transaction or the use of watermarking on digital photographs.

Network administration
• Electronic security: for example, authorized access, levels of access, biometrics, login, password,
firewalls, proxy server, encryption, secure socket layer (SSL), audit trails

Internet threats and security
• Internet security: for example, firewall, proxy server, SSL (secure sockets layer), encryption, public and
private keys, digital signatures
• Internet threats: for example, global viruses, hackers, spam, phishing, pharming, spyware, adware

 

 

Why

Databases lie at the heart of most IT systems whether in businesses, organizations or other institutions.

 

How

By completing the DB questions