SlideShare a Scribd company logo
PROPOSAL ON IMPLEMENTING AN 
IMPROVED SECURITY FOR COLLIN’s 
DATABASE AND TELECOMMUTERS
INTRODUCTION 
o The computer has become more of an everyday necessity in our personal world to 
communicate with other people and in our business world to help make the creation of 
advance documents, drawings, and storing the information. With this advancement of 
technology there has been an increased need for internet and file security. More 
businesses have developed a need for a fast and efficient way of transmitting information 
for various purposes within their business. With the increased use of the computer, there 
is a huge concern that the information that they have stored will be retrieved and misused. 
o Thus, it is essential that companies incorporate security measures so users both within the 
company and outside the company do not obtain, change, and even destroy the data that 
is maintained on their database. 
o Some of the threats for telecommuting are; computer viruses, password hacking, 
man-in middle attacks, identity theft, and social engineering. To overcome these threats, 
telecommuters and businesses need firewall protection, strong encryption, good 
authentication methods and anti-virus software. 
o COLLINS is a state agency that is in charge of maintaining safety for the public 
transportation system. COLLINS gathers and stores confidential information such as 
employee and client information. Therefore, the use of many security measures must be 
maintained and regulated so that unauthorized users are unable to gain access.
AIM: 
The agency aims at implementing the best security 
measures to maximize performance and Web security 
for telecommuters thus ensuring better security of 
data stored in the database server and improving the 
overall database design. 
STATEMENT OF PURPOSE: 
To make the database a more secure 
environment and to implement a combination 
of security measures that includes audit trails, 
database patches, IDS, firewalls
OBJECTIVE 
• To ensure better security of data stored 
in the database server, improve the 
overall database design 
• To entail techniques of proper 
encryption, firewalls, and to enhance the 
overall performance of COLLIN’s 
database.
RISK ANALYSIS 
• To consider when implementing security to the database is 
that multiple entry points are available to the database 
information for employees and business partners. The 
difficulty that is associated with ensuring each of these lines 
are secure is the complexity of the system itself changes as 
the company grows. 
• It is very crucial when implementing a firewall, the 
corporation has to decide how the firewall screens traffic and 
develops the firewall to accept or deny the incoming traffic to 
the system. 
• Network sniffers try to steal information as it is transmitted 
through the network from the client to the application server. 
Once they gain access to the information, they will misuse it. 
•
METHODOLOGY 
• Methods as installing fire wall, setting up 
isolation region for protected resource, 
encrypting 
• the sensitive information being stored and 
transmitted, providing identity authentication 
• and building secret passage, providing digital 
signature for audit and tracking to software 
• without any security guarantee are adopted 
to ensure Web service security.
1. INSTALL FIRE WALL 
The most popular security method is providing an isolation 
region to LAN or website. Fire wall of LAN is a function 
module inside computer or network equipments between 
innernet and Internet. Its purpose is to provide security 
protection to an innernet or host and control access 
objects, so it can also called access control technology. 
There are two operation mechanisms for fire wall e.g. 
packet filtering and agency. Packet filtering aims at the 
service provided by host of special IP address. Its basic 
principle is to intercept and capture IP packet of IP layer in 
network transmission, then find out resource address and 
destination address, source port and destination port of IP 
packet. Whether to transmit IP packet is based on fixed 
filtering principle. Agent is achieved in the application 
layer, the basic principle is to construct an independent 
agent program for Web services, and client program and 
the server can only exchange.
2. Encryption for Confidential Information 
This method is particularly effective to protect confidential 
information, which can prevent wiretapping and hacking. 
Transmission encryption in Web services is in general 
achieved in the application layer. When WWW server sends 
confidential information, firstly, it selects keys to encrypt the 
information, based on the receiver's IP address or other 
identification; After browser receives the encrypted data, it 
decrypts the encrypted data according to source address or 
other identification of the information in IP packet to get the 
required data. In addition, transmission, encryption and 
decryption of information at the IP layer also can be achieved 
by encrypting and decrypting the whole message to ensure 
information security at the network layer.
3. Provide Identity Authentication for the Client / Server 
Communication and Establish A 
Secure Channel 
Currently some network security protocols e.g. SSL and PCT have appeared, which are 
based on the existing network protocol. These two protocols are mainly used for not 
only protecting confidential information but also preventing other unauthorized users 
to invade their own host. SSL protocol is a private communication and includes 
technology of authentication, signature, encryption for the server, which can not only 
provide authentication for the server but also provide authentication for the client 
according to the options of the server. www.intechopen.com8 Security Enhanced 
Applications for Information Systems SSL protocol can run on any kind of reliable 
communication protocols, e.g. TCP, and can also run in application protocols e.g. 
HTTP, FTP, Telnet etc. SSL protocol uses X.509 V3 certification standards, RSA, Diffie- 
Hellman and the Fortezza-KEA as its public key algorithm and uses the RC4-128, RC- 
128, DES, 3-layer DWS or IDEA as its data encryption algorithm. The authentication 
scheme and encryption algorithm provided by PCT are more abundant than SSL, and it 
makes improvements in some details of the agreement. IPSec protocol is used to 
provide end to end encryption and authentication services for public and private 
networks. It specifies all kinds of optional network security services, and the 
organizations can integrate and match these services according to their own security 
policy.
4. Digital Signatures for the Software 
Many large companies use digital signature technology for their 
software, and claim that they are responsible for the security of their 
software, especially e.g. Java applets, ActiveX controls, which will bring 
risks to Web services. Digital signatures are based on public key 
algorithms, using their private key to sign its own released software, 
and are authenticated by using the public key. Microsoft's 
Authenticode technology is used to identify a software publisher and 
prove that it has not been damaged. Authenticode is software for 
client, which monitors the ActiveX control, Cab files, Java applets, or 
download of executable file, and look for the digital certificate to 
verify in these files, and then show warning words, the certificate 
organization's name and other information to the user for possible 
security problems. Digital signature can protect the integrity of the 
software, and it is sensitive to illegal change of the software in the 
transfer process
BUDGET 
Personal Firewall Products: 
•McAfee Internet Security Suite www.mcfee.com $49.99 - 
$69.99 Windows 
•Norton Internet Security 2011 www.symantec.com $69.99 - 
$99.9 Windows 
•ZoneAlarm Internet Security Suite 6 www.zonelabs.com 
$49.95 Windows 
•Trend Micro PC-cillin Internet Security 2011 
www.trendmicro.com $49.95 - 124.95 Windows 
•Smooth Wall www.smoothwall.org, Free ,Linux 
•Sygate Personal Firewall www.sygate.com, Free ,Windows 
•Tiny Firewall www.tinysofware.com ,Free ,Windows 
Total Budget :$375.95
BENEFITS 
• First line of defense: Transparently detect and 
block SQL injection attacks, privilege 
escalation, and other threats. 
• Faster response: Automatically detect 
unauthorized database activities that violate 
security policies, and thwart perpetrators 
from covering their tracks 
• Simplified compliance reporting: Easily 
analyze audit and event data and take action 
in a timely fashion with out-of-the-box 
compliance reports.
CONCLUSION AND RECOMMENDATIONS 
Also, as a telecommuter, the companies should 
recommend providing their employees with the best 
firewalls available to their employees working outside the 
office. The best software is the one which serves business 
needs and is based on the network infrastructure and 
business environment. Personal firewalls are designed in 
such a way that it is easy to install and operate, and can 
significantly reduce the risk of intrusion. The rationale of 
having a firewall is to keep out hackers and permit or 
deny certain traffic in/out of the network. The firewall is 
one of the building blocks of a well-designed security 
structure.

More Related Content

What's hot

Information Security Basics for Businesses and Individuals
Information Security Basics for Businesses and IndividualsInformation Security Basics for Businesses and Individuals
Information Security Basics for Businesses and Individuals
Josh Moulin, MSISA,CISSP
 
Topic11
Topic11Topic11
Topic11
Anne Starr
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
Nawanan Theera-Ampornpunt
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3
Mukesh Chinta
 
презентация1
презентация1презентация1
презентация1
sagidullaa01
 
Network security
Network securityNetwork security
Network security
mena kaheel
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Jiunn-Jer Sun
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
Stefano Maria De' Rossi
 
GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014Ravindran Vasu
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
Art Ocain
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Twobackdoor
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
Online
 
Cyber secure
Cyber secure Cyber secure
Cyber secure
Gaurav Sachdeva
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Edureka!
 
Cybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity lawsCybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity laws
Bryan Len
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
Mukesh Chinta
 
SOC-as-a-Service - comSpark 2019
SOC-as-a-Service - comSpark 2019SOC-as-a-Service - comSpark 2019
SOC-as-a-Service - comSpark 2019
Advanced Technology Consulting (ATC)
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & SecurityNetstarterSL
 
Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing Lab
Syed Ubaid Ali Jafri
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
BeyondTrust
 

What's hot (20)

Information Security Basics for Businesses and Individuals
Information Security Basics for Businesses and IndividualsInformation Security Basics for Businesses and Individuals
Information Security Basics for Businesses and Individuals
 
Topic11
Topic11Topic11
Topic11
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3
 
презентация1
презентация1презентация1
презентация1
 
Network security
Network securityNetwork security
Network security
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
 
GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Cyber secure
Cyber secure Cyber secure
Cyber secure
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
 
Cybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity lawsCybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity laws
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
SOC-as-a-Service - comSpark 2019
SOC-as-a-Service - comSpark 2019SOC-as-a-Service - comSpark 2019
SOC-as-a-Service - comSpark 2019
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing Lab
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
 

Viewers also liked

SUPERPHONES
SUPERPHONESSUPERPHONES
SUPERPHONES
Rishabh Gupta
 
“WIRELESS TILT MOUSE” -using XBEE module
“WIRELESS TILT MOUSE”-using XBEE module“WIRELESS TILT MOUSE”-using XBEE module
“WIRELESS TILT MOUSE” -using XBEE module
Rishabh Gupta
 
ujian praktik kejuruan
ujian praktik kejuruanujian praktik kejuruan
ujian praktik kejuruan
Yogi25
 
Buddy navigator
Buddy navigatorBuddy navigator
Buddy navigator
Rishabh Gupta
 
Web development
Web developmentWeb development
Web development
Rishabh Gupta
 
tugas 2
tugas 2tugas 2
tugas 2
Yogi25
 
Gis Application
Gis ApplicationGis Application
Gis Application
Rishabh Gupta
 
Google Glasses
Google GlassesGoogle Glasses
Google Glasses
Rishabh Gupta
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Rishabh Gupta
 
E learning website
E  learning websiteE  learning website
E learning website
Rishabh Gupta
 
Installment of database management system
Installment of database management systemInstallment of database management system
Installment of database management system
Rishabh Gupta
 
A Proposal on Bio Gas Plants for villages
A Proposal on Bio Gas Plants for villagesA Proposal on Bio Gas Plants for villages
A Proposal on Bio Gas Plants for villages
Rishabh Gupta
 
Big data
Big dataBig data
Big data
Rishabh Gupta
 
Security protection On banking systems using ethical hacking.
Security protection  On banking systems using  ethical hacking.Security protection  On banking systems using  ethical hacking.
Security protection On banking systems using ethical hacking.
Rishabh Gupta
 
Event management
Event managementEvent management
Sucker Rod Pump (SRP)
Sucker Rod Pump (SRP)Sucker Rod Pump (SRP)
Sucker Rod Pump (SRP)
Rakesh Kumar
 
Security in Android Application
Security in Android ApplicationSecurity in Android Application
Security in Android Application
Rishabh Gupta
 
Xillion Telecom Pvt. Ltd
Xillion Telecom Pvt. LtdXillion Telecom Pvt. Ltd
Xillion Telecom Pvt. Ltd
Xillion Telecom Private Limited
 

Viewers also liked (18)

SUPERPHONES
SUPERPHONESSUPERPHONES
SUPERPHONES
 
“WIRELESS TILT MOUSE” -using XBEE module
“WIRELESS TILT MOUSE”-using XBEE module“WIRELESS TILT MOUSE”-using XBEE module
“WIRELESS TILT MOUSE” -using XBEE module
 
ujian praktik kejuruan
ujian praktik kejuruanujian praktik kejuruan
ujian praktik kejuruan
 
Buddy navigator
Buddy navigatorBuddy navigator
Buddy navigator
 
Web development
Web developmentWeb development
Web development
 
tugas 2
tugas 2tugas 2
tugas 2
 
Gis Application
Gis ApplicationGis Application
Gis Application
 
Google Glasses
Google GlassesGoogle Glasses
Google Glasses
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
E learning website
E  learning websiteE  learning website
E learning website
 
Installment of database management system
Installment of database management systemInstallment of database management system
Installment of database management system
 
A Proposal on Bio Gas Plants for villages
A Proposal on Bio Gas Plants for villagesA Proposal on Bio Gas Plants for villages
A Proposal on Bio Gas Plants for villages
 
Big data
Big dataBig data
Big data
 
Security protection On banking systems using ethical hacking.
Security protection  On banking systems using  ethical hacking.Security protection  On banking systems using  ethical hacking.
Security protection On banking systems using ethical hacking.
 
Event management
Event managementEvent management
Event management
 
Sucker Rod Pump (SRP)
Sucker Rod Pump (SRP)Sucker Rod Pump (SRP)
Sucker Rod Pump (SRP)
 
Security in Android Application
Security in Android ApplicationSecurity in Android Application
Security in Android Application
 
Xillion Telecom Pvt. Ltd
Xillion Telecom Pvt. LtdXillion Telecom Pvt. Ltd
Xillion Telecom Pvt. Ltd
 

Similar to Implementing an improved security for collin’s database and telecommuters

Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber lawDivyank Jindal
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
SofiyaKhan49
 
Internet security
Internet securityInternet security
Internet security
Tapan Khilar
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
Leif Davidsen
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
Robert Parker
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation
Nikec Solutions
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
RushikeshChikane2
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
Pyingkodi Maran
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
Brianna Johnson
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
Universitas Bina Darma Palembang
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
DEEPAK948083
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Network security
Network securityNetwork security
Network security
Ravikumar Natarajan
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
sahil lalwani
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
Intelligentia IT Systems Pvt. Ltd.
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Identive
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
Tejaswi Agarwal
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
Pyingkodi Maran
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...
Erin Moore
 

Similar to Implementing an improved security for collin’s database and telecommuters (20)

Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
Internet security
Internet securityInternet security
Internet security
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Network security
Network securityNetwork security
Network security
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
 
Case study
Case studyCase study
Case study
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...
 

Recently uploaded

Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 

Recently uploaded (20)

Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 

Implementing an improved security for collin’s database and telecommuters

  • 1. PROPOSAL ON IMPLEMENTING AN IMPROVED SECURITY FOR COLLIN’s DATABASE AND TELECOMMUTERS
  • 2. INTRODUCTION o The computer has become more of an everyday necessity in our personal world to communicate with other people and in our business world to help make the creation of advance documents, drawings, and storing the information. With this advancement of technology there has been an increased need for internet and file security. More businesses have developed a need for a fast and efficient way of transmitting information for various purposes within their business. With the increased use of the computer, there is a huge concern that the information that they have stored will be retrieved and misused. o Thus, it is essential that companies incorporate security measures so users both within the company and outside the company do not obtain, change, and even destroy the data that is maintained on their database. o Some of the threats for telecommuting are; computer viruses, password hacking, man-in middle attacks, identity theft, and social engineering. To overcome these threats, telecommuters and businesses need firewall protection, strong encryption, good authentication methods and anti-virus software. o COLLINS is a state agency that is in charge of maintaining safety for the public transportation system. COLLINS gathers and stores confidential information such as employee and client information. Therefore, the use of many security measures must be maintained and regulated so that unauthorized users are unable to gain access.
  • 3. AIM: The agency aims at implementing the best security measures to maximize performance and Web security for telecommuters thus ensuring better security of data stored in the database server and improving the overall database design. STATEMENT OF PURPOSE: To make the database a more secure environment and to implement a combination of security measures that includes audit trails, database patches, IDS, firewalls
  • 4. OBJECTIVE • To ensure better security of data stored in the database server, improve the overall database design • To entail techniques of proper encryption, firewalls, and to enhance the overall performance of COLLIN’s database.
  • 5. RISK ANALYSIS • To consider when implementing security to the database is that multiple entry points are available to the database information for employees and business partners. The difficulty that is associated with ensuring each of these lines are secure is the complexity of the system itself changes as the company grows. • It is very crucial when implementing a firewall, the corporation has to decide how the firewall screens traffic and develops the firewall to accept or deny the incoming traffic to the system. • Network sniffers try to steal information as it is transmitted through the network from the client to the application server. Once they gain access to the information, they will misuse it. •
  • 6. METHODOLOGY • Methods as installing fire wall, setting up isolation region for protected resource, encrypting • the sensitive information being stored and transmitted, providing identity authentication • and building secret passage, providing digital signature for audit and tracking to software • without any security guarantee are adopted to ensure Web service security.
  • 7. 1. INSTALL FIRE WALL The most popular security method is providing an isolation region to LAN or website. Fire wall of LAN is a function module inside computer or network equipments between innernet and Internet. Its purpose is to provide security protection to an innernet or host and control access objects, so it can also called access control technology. There are two operation mechanisms for fire wall e.g. packet filtering and agency. Packet filtering aims at the service provided by host of special IP address. Its basic principle is to intercept and capture IP packet of IP layer in network transmission, then find out resource address and destination address, source port and destination port of IP packet. Whether to transmit IP packet is based on fixed filtering principle. Agent is achieved in the application layer, the basic principle is to construct an independent agent program for Web services, and client program and the server can only exchange.
  • 8. 2. Encryption for Confidential Information This method is particularly effective to protect confidential information, which can prevent wiretapping and hacking. Transmission encryption in Web services is in general achieved in the application layer. When WWW server sends confidential information, firstly, it selects keys to encrypt the information, based on the receiver's IP address or other identification; After browser receives the encrypted data, it decrypts the encrypted data according to source address or other identification of the information in IP packet to get the required data. In addition, transmission, encryption and decryption of information at the IP layer also can be achieved by encrypting and decrypting the whole message to ensure information security at the network layer.
  • 9. 3. Provide Identity Authentication for the Client / Server Communication and Establish A Secure Channel Currently some network security protocols e.g. SSL and PCT have appeared, which are based on the existing network protocol. These two protocols are mainly used for not only protecting confidential information but also preventing other unauthorized users to invade their own host. SSL protocol is a private communication and includes technology of authentication, signature, encryption for the server, which can not only provide authentication for the server but also provide authentication for the client according to the options of the server. www.intechopen.com8 Security Enhanced Applications for Information Systems SSL protocol can run on any kind of reliable communication protocols, e.g. TCP, and can also run in application protocols e.g. HTTP, FTP, Telnet etc. SSL protocol uses X.509 V3 certification standards, RSA, Diffie- Hellman and the Fortezza-KEA as its public key algorithm and uses the RC4-128, RC- 128, DES, 3-layer DWS or IDEA as its data encryption algorithm. The authentication scheme and encryption algorithm provided by PCT are more abundant than SSL, and it makes improvements in some details of the agreement. IPSec protocol is used to provide end to end encryption and authentication services for public and private networks. It specifies all kinds of optional network security services, and the organizations can integrate and match these services according to their own security policy.
  • 10. 4. Digital Signatures for the Software Many large companies use digital signature technology for their software, and claim that they are responsible for the security of their software, especially e.g. Java applets, ActiveX controls, which will bring risks to Web services. Digital signatures are based on public key algorithms, using their private key to sign its own released software, and are authenticated by using the public key. Microsoft's Authenticode technology is used to identify a software publisher and prove that it has not been damaged. Authenticode is software for client, which monitors the ActiveX control, Cab files, Java applets, or download of executable file, and look for the digital certificate to verify in these files, and then show warning words, the certificate organization's name and other information to the user for possible security problems. Digital signature can protect the integrity of the software, and it is sensitive to illegal change of the software in the transfer process
  • 11. BUDGET Personal Firewall Products: •McAfee Internet Security Suite www.mcfee.com $49.99 - $69.99 Windows •Norton Internet Security 2011 www.symantec.com $69.99 - $99.9 Windows •ZoneAlarm Internet Security Suite 6 www.zonelabs.com $49.95 Windows •Trend Micro PC-cillin Internet Security 2011 www.trendmicro.com $49.95 - 124.95 Windows •Smooth Wall www.smoothwall.org, Free ,Linux •Sygate Personal Firewall www.sygate.com, Free ,Windows •Tiny Firewall www.tinysofware.com ,Free ,Windows Total Budget :$375.95
  • 12. BENEFITS • First line of defense: Transparently detect and block SQL injection attacks, privilege escalation, and other threats. • Faster response: Automatically detect unauthorized database activities that violate security policies, and thwart perpetrators from covering their tracks • Simplified compliance reporting: Easily analyze audit and event data and take action in a timely fashion with out-of-the-box compliance reports.
  • 13. CONCLUSION AND RECOMMENDATIONS Also, as a telecommuter, the companies should recommend providing their employees with the best firewalls available to their employees working outside the office. The best software is the one which serves business needs and is based on the network infrastructure and business environment. Personal firewalls are designed in such a way that it is easy to install and operate, and can significantly reduce the risk of intrusion. The rationale of having a firewall is to keep out hackers and permit or deny certain traffic in/out of the network. The firewall is one of the building blocks of a well-designed security structure.