Sie sind auf Seite 1von 10

Skip to main content

 LOG IN

 SIGN UP

DOCX
Chapter 2 Related Literature and Studies 2.1 Foreign Literature 2.1.1 Records
Management
Kokey Okey

Download with Google Download with Facebook


or download with email

Chapter 2 Related Literature and Studies 2.1 Foreign Literature 2.1.1 Records
Management
DOWNLO AD

information and record! it is recommended that the reader maintaina simple but consistent
definition of a record throughout this thesis.
2.1.2 Make Your Database More Secure
http://www.dar'reading.com/vulnerabilities and threats/ steps to ma'e your database mor
e secure/d/d id/0010121 any companies aren3t able to protect mission criticaldata
because they simply don3t understand how all the movingparts of their
database environments wor'. 4or controls to wor'! ,$must have a clear
understanding of where the important data is!who3s using it! and how it3s being
used. 56ou have one data store! but you might have manyapplications hoo'ed into it. 6ou
might not 'now who it is that3s usingthe systems if you3ve given out a lot of privileges!5 says
el Sha'ir!C$% of 7itroSecurity! a database activity monitoring "89 #
ands e c u r i t y i n f o r m a t i o n a n d e v e n t m o n i t o r i n g c o m p a n y r e c e n t l y purc
hased by c9fee. 59nd you might not even 'now where thecritical data is if it3s
been copied off the system and moved to! say!test databases somewhere else.5 aluable
steps include scanningfor unsanctioned! rogue databases that might have been set up
onthe fly by other departments! documenting privilege schemas! andclassifying a
company3s database assets by ris' according to the

type of data they hold. $hat can help get more out of
databases e c u r i t y i n v e s t m e n t s . % n c e , $ t e a m s ' n o w w h e r e
a l l y o u r databases are! they can ma'e sure they3re securely configured andpatched! and use
vulnerability assessment to decide what level of protection they need. 4or e+ample!
they can decide if they
warrantconstant oversight through activity monitoring software to trac'what
users are doing in these data stores at all times.
2.1.3 Student Attendance Monitoring
https://www.sheffield.ac.u'/ssd/sam/systems;<eports$he =niversity has a comprehensiv
e Student 9ttendance onitoring policy "the policy and guidance document is available asa
download at www.shef.ac.u'/ssd/sam#. 9longside this a centralStudent 9ttendance
onitoring "S9 # system has been designedto assist departments
in the collection! storage and analysis of attendance monitoring data relating to
students. $he S9 systemcan be accessed in three
ways:0 # > o d i r e c t v i a t h e w e b p a g e www.shef.ac.u'/attend
ance2# ?og into =S@ and go to the Staff 9pplications tab. ,n the )C,@SStudent! C,@S Staff and
Student 9ttendance onitoring*
channel!s e l e c t ) S t u d e n t 9 t t e n d a n
c e o n i t o r i n g * .

# 9lternatively! if you are logged into C,@S already! at the ain enu! select
%ption 0 )9ttendance onitoring*.
2.1.4 Data Security
http://www.studymode.com/essays/8ata Security A2B DE.html 9 computer security ris' is a
ny event or action that couldcause loss of or damage to computer hardware!
software! data!information! or processing capability. Some breaches to
computer s e c u r i t y a r e a c c i d e n t a l ! o t h e r s a r e p l a n n e d i n t r u s i o n s . S o m e
intruders do no damageF they merely access data! information
or p r o g r a m s o n t h e c o m p u t e r b e f o r e l o g g i n g o f f . % t h e r i n t r u d e r s i n d i
c a t e s o m e e v i d e n c e o f t h e i r p r e s e n c e e i t h e r b y l e a v i n g a message or by
deliberately altering or damaging data. Computer systems are vulnerable to many
threats which can inflict varioustypes of damage resulting in significant losses.
8amage can
rangef r o m m i n o r e r r o r s w h i c h s a p d a t a b a s e i n t e g r i t y t o f i r e s w h i c h de
stroy entire computer centers. ?osses can stem from the actionsof supposedly trusted
employees defrauding the system to outsidehac'ers roaming freely through the ,nternet.
$he e+act amount
of computer related losses is un'nowableF many losses are never d i s c o v e r
e d a n d o t h e r s a r e c o v e r e d u p t o a v o i d u n f a v o r a b l e publicity.

Common
$hreats: 9 wide variety of threats face today3s computer systems and theinformation
they process. ,n order to control the ris's of
operatinga n i n f o r m a t i o n s y s t e m ! m a n a g e r s a n d u s e r s m u s t ' n o w
t h e vulnerabilities of the system and the threats
which may e+ploitt h e m . G n o w l e d g e o f t h e t h r e a t e n v i r o n m e n t a l l o w s t
h e s y s t e m manager to implement the most cost effective security measures.,n some
cases! managers may find it most cost effective to simplytolerate the e+pected losses.
2 . 1 . ! i o m e t r i c t i m e a n d a t t e n d a n c e s y s t e m " i t # e $ i d e r m a l to$ogra
$#ical u$dating ca$ability
http://www.google.com/patents/=SBEBEB 0
$ h e p r e s e n t i n v e n t i o n r e l a t e s t o t i m e a n d a t t e n d a n c e devices.
o r e p a r t i c u l a r l y ! t h e p r e s e n t i n v e n t i o n r e l a t e s t o a biometric time
and attendance device for scanning a portion of ahuman epidermis! generating
an epidermal topographical
patterna n d t r a n s m i t t i n g t h e e p i d e r m a l t o p o g r a p h i c a l p a t t e r n t o a h o s
t computer for determining access privileges and for updating anepidermal
topographical database.
,ncreasingly! security problems are becoming a more noticeablepart of
modern life. Security was once primarily the preserve
of c l a s s i f i e d g o v e r n m e n t i n s t a l l a t i o n s ! b u t i n c r e a s i n g l o s s e s a n d c a l a
m i t y h a v e f o r c e d t h e r e v i e w o f s e c u r i t y e ( u i p m e n t a n d procedure
s for government and industry. Hroperty losses and thetheft of corporate secrets cost
industry billions of dollars annually.Hublic safety is endangered by the ability of intruders to
easily
enter s e c u r e d p l a c e s ! s u c h a s a i r c r a f t a n d a i r p o r t b u i l d i n g s ! w i t h o u t det
ection. 9ccordingly! access control and personnel identification arebecoming the
object of significant e+penditures by organi&ationssee'ing to identify
employees! vendors and others who are to bepermitted access to secured
areas.$ y p i c a l a c c e s s c o n t r o l a p p l i c a t i o n s i n c l u d e : c o m p u t e r c e n t e r s F
r a d i o a c t i v e o r b i o l o g i c a l d a n g e r a r e a s F c o n t r o l l e d e+perimentsF
information storage areasF airport maintenance
andfreight areasF drug storage areasF apartment houses and officebuildingsF
safe deposit bo+es and vaultsF and computer terminalentry.
2.2 Local Literature2.2.1 %lass Searc# and Registration System
Iy
danteliu
J ay
2102http://www.studymode.com/essays/Class Search 9nd <egistration System 0112 0B.html
Ktopic$he purpose of this report is to e+plore and research
thei s s u e s f a c i n g s t u d e n t s u s i n g t h e C S = @ I o n l i n e s e a r c h a n d re
gistration systems. -
e employed various mar'eting researchmethodologies in order to effectively
ac(uire
and formulate our d a t a . $ h e s e m e t h o d o l o g i e s i n c l u d e d c o n s t r u c t i n g a
r e s e a r c h problem! research objectives and associated research (uestions.7e+t a focus
group was arranged ta'en from a random sample of CS=@I business students.
,nformation from the focus group
wasu s e d a l o n g s i d e t h e a f o r e m e n t i o n e d m a r ' e t i n g r e s
e a r c h methodologies in order to create and compose a survey which wassent out to
the entire college of business in order to gain a muchmore in depth
understanding of our research problem. $he clienttherefore wanted to 'now what specific
problems the students whileusing the system as well as their recommendations!
suggestionsand solutions to these issues.

RELATED PAPERS
Documentation in database
By Ysabelle Hermosura
44444.docx
By jericho mendoza
Implementation of Student Attendance Management System
By IJIRST - International Journal for Innovative Research in Science and Technology
Attendance and Information System using RFID and Web-Based Application for
Academi…
By NABEEL ALI
Local
By kayle tolentino
READ PAPER

 About
 Press

Blog
 People
 Papers
 Job Board
 Advertise
 We're Hiring!
 Help Center

 Find new research papers in:


 Physics
 Chemistry
 Biology
 Health Sciences
 Ecology
 Earth Sciences
 Cognitive Science
 Mathematics
 Computer Science

Terms
 Privacy
 Copyright
 Academia ©2019

Das könnte Ihnen auch gefallen