Dokumen ini membahas tentang keamanan dasar pada database Oracle yang mencakup pengguna, hak akses, peran, dan autentikasi. Keamanan dasar ini digunakan untuk mengelola hak akses pengguna terhadap database.
The first part of the report presents recent migratory patterns by origin and destination. These estimates allow for an assessment of the scope of international migration from developing countries, providing a critical underpinning to the debate on international migration and development. Recent levels of remittance transfers are also presented, including evidence on the costs of transferring remittances. Further, the report highlights recent activities to safeguard the rights of migrants and to combat irregular migration. Gaps in protecting and assisting migrants, including “stranded migrants” and people who move in the context of environmental change, are discussed. The second part of the report synthesizes recent efforts of the United Nations system to enhance partnerships, coordination and cooperation through coordination meetings and the Global Migration Group (GMG). It also reviews the support provided by the GMG to Member States, including the Global Forum on Migration and Development (GFMD). The third part of the report contains proposals for the organisation of the High-level Dialogue on International Migration and Development, to be convened by the General Assembly during its sixty-eighth session in 2013, pursuant to resolution 63/225. The report suggests a structure and format for the event as well as possible themes, preparatory activities and outcomes. The report concludes with a set of concrete recommendations to enhance the benefits of migration and to reduce its negative impacts for development and recounts the steps that are being taken in preparing for the 2013 High-level Dialogue.
Community economie, ontwikkelingen in de HR markt, veranderingen in HR instrumenten, 10 principles of community economy, nieuwe structuren: profile -> connect -> collaborate, Wikinomics, e-Portfolio, open innovatie,
community software.
The first part of the report presents recent migratory patterns by origin and destination. These estimates allow for an assessment of the scope of international migration from developing countries, providing a critical underpinning to the debate on international migration and development. Recent levels of remittance transfers are also presented, including evidence on the costs of transferring remittances. Further, the report highlights recent activities to safeguard the rights of migrants and to combat irregular migration. Gaps in protecting and assisting migrants, including “stranded migrants” and people who move in the context of environmental change, are discussed. The second part of the report synthesizes recent efforts of the United Nations system to enhance partnerships, coordination and cooperation through coordination meetings and the Global Migration Group (GMG). It also reviews the support provided by the GMG to Member States, including the Global Forum on Migration and Development (GFMD). The third part of the report contains proposals for the organisation of the High-level Dialogue on International Migration and Development, to be convened by the General Assembly during its sixty-eighth session in 2013, pursuant to resolution 63/225. The report suggests a structure and format for the event as well as possible themes, preparatory activities and outcomes. The report concludes with a set of concrete recommendations to enhance the benefits of migration and to reduce its negative impacts for development and recounts the steps that are being taken in preparing for the 2013 High-level Dialogue.
Community economie, ontwikkelingen in de HR markt, veranderingen in HR instrumenten, 10 principles of community economy, nieuwe structuren: profile -> connect -> collaborate, Wikinomics, e-Portfolio, open innovatie,
community software.
Advertising and Communication Strategy for Indian Women to generate desire to buy Chevrolet Volt. Presentation discusses the target audience, mood board and communication strategy.
Business Phone Systems in Harker Heights, TXFolkersoncom
Folkerson Communications, Ltd is a leading provider of business phone systems in Harker Heights, TX. The telecommunication service provider assists the small or large business firms to fulfill all the phone system requirements at affordable prices. To know more about the services offered by the company in Harker Heights, visit - www.folkersoncom.com
An Experimental Investigation on Strengths Characteristics of Concrete with t...IJERA Editor
The present work is directed towards developing a better understanding on strengths
characteristics of concrete using marble dust powder as a partial replacement of cement. T h e
Dissertation work is carried out with M30 grade concrete for which the marble powder is replaced by 0%,
5%, 10%, 15%, 20% by weight of cement. For all the mixes compressive, flexural and split tensile
strengths are determined at different days of curing. In addition to this, sand is replaced with stone dust (SD) by
10%, 20% and 30% along with cement is replaced with MP by 0%, 10% and 20% by weight for M30 grades of
concrete. Only 3 cubes were casted for various percentage replacements of sand with SD and cement with MP
for 7days and 28 days. The results of the present investigation indicate that marble dusts incorporation results
insignificant improvements in the compressive, flexural and split tensile strengths of concrete upto 10% of
replacement and also the results of the present investigation indicate that stone dusts and marble dust
incorporation results insignificant improvements in the compressive strengths of concrete upto 20% of SD
and 10% of MP of replacement.
Keamanan merupakan suatu proteksi terhadap pengrusakan data dan pemakaian data oleh pemakai yang tidak punya kewenangan.
System yang aman memastikan kerahasian data yang terdapat didalamnya.
Beberapa aspek keamanan yaitu :
-Mambatasi akses ke data dan servis
-Melakukan autentifikasi pada user
-Memonitor aktivitas-aktivitas yang mencurigakan
Advertising and Communication Strategy for Indian Women to generate desire to buy Chevrolet Volt. Presentation discusses the target audience, mood board and communication strategy.
Business Phone Systems in Harker Heights, TXFolkersoncom
Folkerson Communications, Ltd is a leading provider of business phone systems in Harker Heights, TX. The telecommunication service provider assists the small or large business firms to fulfill all the phone system requirements at affordable prices. To know more about the services offered by the company in Harker Heights, visit - www.folkersoncom.com
An Experimental Investigation on Strengths Characteristics of Concrete with t...IJERA Editor
The present work is directed towards developing a better understanding on strengths
characteristics of concrete using marble dust powder as a partial replacement of cement. T h e
Dissertation work is carried out with M30 grade concrete for which the marble powder is replaced by 0%,
5%, 10%, 15%, 20% by weight of cement. For all the mixes compressive, flexural and split tensile
strengths are determined at different days of curing. In addition to this, sand is replaced with stone dust (SD) by
10%, 20% and 30% along with cement is replaced with MP by 0%, 10% and 20% by weight for M30 grades of
concrete. Only 3 cubes were casted for various percentage replacements of sand with SD and cement with MP
for 7days and 28 days. The results of the present investigation indicate that marble dusts incorporation results
insignificant improvements in the compressive, flexural and split tensile strengths of concrete upto 10% of
replacement and also the results of the present investigation indicate that stone dusts and marble dust
incorporation results insignificant improvements in the compressive strengths of concrete upto 20% of SD
and 10% of MP of replacement.
Keamanan merupakan suatu proteksi terhadap pengrusakan data dan pemakaian data oleh pemakai yang tidak punya kewenangan.
System yang aman memastikan kerahasian data yang terdapat didalamnya.
Beberapa aspek keamanan yaitu :
-Mambatasi akses ke data dan servis
-Melakukan autentifikasi pada user
-Memonitor aktivitas-aktivitas yang mencurigakan
1. BASIC SECURITY
(ORACLE)
Anggota :
Nur Rachmat S (13523145)
Ryan Achmad R (13523170)
Lalu Maugirzani F (13523187)
Nindita Rahman (13523197)
Yogi Cahya Gumilang (13523207)
2. Basic Security
• Keamanan dasar pada database
• Untuk mengelola keamanan dan hak akses user pada database
• Basic Security meliputi :
Pengguna -> User
Hak Akses -> Privilege
Peran -> Role
Autentikasi -> Authentication
3. User
• User biasa di sebut Pengguna yang umumnya adalah manusia.
• User merupakan bagian penting, karena agar dapat memasuki
sistem dan menjalankan aktivitas pada sistem.
• Pada oracle terdapat 2 user bawaan yaitu :
sys
system
4. Contoh Perintah SQL (User)
• Membuat User
• Mengedit User
• Menghapus User
CREATE USER rohmad IDENTIFIED BY abcde;
ALTER USER rohmad IDENTIFIED BY gantipas;
DROP USER rohmad;
5. Privileges
• Privileges merupakan hak akses yang diberikan kepada user
• Bertujuan untuk mengendalikan hak user yang terhubung
dengan database baik system maupun objek
• Terbagi menjadi dua yaitu Object Privileges dan System
Privileges
• Terdapat 2 perintah untuk menjalankan privileges :
Operasi Grant
Operasi Revoke
6. Contoh Perintah SQL (Privileges)
• Operasi Grant
• Operasi Revoke
grant create table to rohmad;
REVOKE create table from rohmad;
grant select on budi.mahasiswa to rohmad;
REVOKE select on budi.mahasiswa from scotti;
7. Role
• Role merupakan kumpulan beberapa privilage
• Tujuan mempermudah pemberian ke sekelompok user yang
memiliki privileges yang sama
• Misalkan pada operasi SET didalamnya terdapat CREATE,
ALTER, dan DROP
• Terdapat 2 operasi untuk menjalankan role :
Operasi Grant
Operaso Revoke
8. Contoh Perintah SQL (Role)
• Operasi Grant
• Operasi Revoke
grant connect table to rohmad;
REVOKE connect table from rohmad;
9. Autentifikasi
• Suatu proses dengan maksud memvalidasi, user dan password
dari pengguna akan di cek secara langsung ke daftar
pengguna yang berhak memasuki sistem atau menjalankan
aktivitas tertentu.
• Dapat juga bertujuan untuk memastikan bahwa identitas dari
user yang ingin mengakses benar-benar sudah
dikenali(terdaftar).
• Hal ini dilakukan untuk mencegah adanya akses dari pihak-
pihak yang tidak berwenang.