Sie sind auf Seite 1von 3

A database is an organized collection of data.

The data is typically organized to model relevant aspects of reality (for example, the availability of rooms in hotels), in a way that supports processes requiring this information (for example, finding a hotel with vacancies). Database management systems (DBMSs) are specially designed applications that interact with the user, other applications, and the database itself to capture and analyze data. A generalpurpose database management system (DBMS) is a software system designed to allow the definition, creation, querying, update, and administration of databases. Well-known DBMSs include MySQL,PostgreSQL, SQLite, Microsoft SQL Server, Microsoft Access, Oracle, Sybase, dBASE, FoxPro, and IBM DB2. A database is not generally portable across different DBMS, but different DBMSs can inter-operate by using standards such as SQL and ODBC or JDBCto allow a single application to work with more than one database. A database model is a type of data model that determines the logical structure of a database and fundamentally determines in which mannerdata can be stored, organized, and manipulated. The most popular example of a database model is the relational model (or the SQL approximation of relational), which uses a table-based format. The northwind database is a sample database included in Microsoft Access and SQL Server 2000. It's available as an optional download for SQL Server 2005. The database contains several tables with sample data that is used by most of our Data Abstract samples, as this database is available on most systems that run Microsoft SQL Server.

SSADM (Structured Systems Analysis & Design Method) is a widely-used computer application development method in the UK, where its use is often specified as a requirement for government computing projects. It is increasingly being adopted by the public sector in Europe. SSADM is in the public domain, and is formally specified in British Standard BS7738. SSADM divides an application development project into modules, stages, steps, and tasks, and provides a framework for describing projects in a fashion suited to managing the project. SSADM's objectives are to:

Improve project management & control Make more effective use of experienced and inexperienced developmentstaff Develop better quality systems Make projects resilient to the loss of staff Enable projects to be supported by computer-based tools such as computer-aided software engineering systems Establish a framework for good communications between participants in a project

SADM covers those aspects of the life-cycle of a system from the feasibility study stage to the production of a physical design; it is generally used in conjunction with other methods, such as PRINCE, which is concerned with the broader aspects of project management. In detail, SSADM sets out a cascade or waterfall view of systems development, in which there are a series of steps, each of which leads to the next step. (This might be contrasted with the rapid application development - RAD - method, which pre-supposes a need to conduct steps in parallel.). SSADM's steps, or stages, are:

Feasibility Investigation of the current environment

Business systems options Definition of requirements Technical system options Logical design Physical design For each stage, SSADM sets out a series of techniques and procedures, and conventions for recording and communicating information pertaining to these - both in textual and diagramatic form. Computer Sec.Comp:Centrify Check Point Crossbeam Systems Cyberoam Cybertrust Cyveillance Security software is a generic term referring to any computer program or library whose purpose is to (help to) secure a computer system or a computer network. Types of security software include:

Antivirus software Anti keylogger Anti-spyware software Anti-Subversion Software Anti-Tamper Software AntiSpam software AntiSpam appliances Cryptographic software Discretionary Access Control software Firewall Internet Security Intrusion detection system (IDS)

Intrusion prevention systems (IPS) Sandbox Any other Operating System security feature

An Information Security Policy usually has the following objectives:

To protect the organisation's business information and any client or customer information within its custody or safekeeping by safeguarding its confidentiality, integrity and availability. To establish safeguards to protect the organisation's information resources from theft, abuse, misuse and any form of damage. To establish responsibility and accountability for Information Security in the organisation. To encourage management and staff to maintain an appropriate level of awareness, knowledge and skill to allow them to minimise the occurrence and severity of Information Security incidents. To ensure that the organisation is able to continue its commercial activities in the event of significant Information Security incidents. To provide suitable coverage of International Standards ISO 17799 and BS 7799.

Das könnte Ihnen auch gefallen