Database Security Threats and Countermeasures

Information is very critical asset. Organizations create so much information and they use database systems to handle the information within them to automate various functions. Due to information importance, information protection is a critical component of the database management system. Information security is the goal of a database management system (DBMS), also called database security. To be able to manage a huge amount of data effectively and fast, a well organized system is needed to build. It will also need to store and retrieve data easily. Generally, a database system is designed to be used by many users simultaneously for the specific collections of data. Databases are classified based on their types of collections, such as images, numeric, bibliographic or full-text. Digitized databases are created by using management system to make, store, maintain or search the data. Oracle, MS SQL and Sybase servers are mostly used in companies, agencies and Continue reading

Different Security Attacks on RFID Systems

Like other information systems, RFID systems are vulnerable to attack and can be compromised at various stages. Generally the attacks against a RFID system can be categorized into four major groups: attacks on authenticity, attacks on integrity, attacks on confidentiality, and attacks on availability. Besides being vulnerable to common attacks such as eavesdropping, man-in-the-middle and denial of service, RFID technology is, in particular, susceptible to spoof and power attacks. This section illustrates the different kinds of attacks on RFID systems. Eavesdropping: Since an RFID tag is a wireless device that emits a unique identifier upon interrogation by a RFID reader, there exists a risk that the communication between tag and reader can be eavesdropped. Eavesdropping occurs when an attacker intercepts data with any compliant reader for the correct tag family and frequency while a tag is being read by an authorized RFID reader. Since most RFID systems use clear text Continue reading

E-Commerce – Definition, History and Types

Electronic commerce (e-commerce) is the term used for any type of business or commercial transaction that involves the transfer of products, services and information over electronic systems such as the internet and other computer networks. The trader and customer are not face to face at any point during these transactions, the business being conducted remotely, regardless of location. E-commerce covers a range of different types of businesses, from consumer based retail sites, through auction or music sites, to business exchanges trading goods and services between corporations. It is currently one of the most important aspects of the Internet to emerge. Almost all big retailers have electronic commerce presence on the World Wide Web. E-Commerce includes transactions within a global Information Economy such as electronic trading of goods and services, online delivery of digital content, electronic funds transfer, electronic share trading, electronic bills of lading, commercial auctions, collaborative designs, engineering and Continue reading

Role and Impact of Management Information Systems (MIS) in an Organization

Management information system (MIS) provides information that organizations require to manage themselves efficiently and effectively. Management information systems are typically computer systems used for managing the organizations. Management information systems are distinct from other information systems because they are used to analyze and facilitate strategic and operational activities. Role of Management Information Systems in an Organization The role of the MIS in an organization can be compared to the role of heart in the body. The information is the blood and MIS is the heart. In the body the heart plays the role of supplying pure blood to all the elements of the body including the brain. The heart works faster and supplies more blood when needed. It regulates and controls the incoming impure blood, processes it and sends it to the destination in the quantity needed. It fulfills the needs of blood supply to human body in normal course Continue reading

A Phased Approach to Software Development

A software comprises of programs and associated data and documentation. Each of these items is a part of software development process. Software development process  is a structure imposed on the development of a software product. The process includes the phased approach to software development, software development models, the software development processes and the software project management processes.The main problems for software development currently are: high cost, low quality and frequent changes causing change and rework. Software has become a limiting factor in the evolution of computer-based systems. The intent of software development is to produce a framework for building higher quality software. In order to achieve successful and quality software certain methods and criteria need to be followed. These methods and criteria are classified as the software development processes. There are several models for such processes, each describing approaches to a variety of tasks or activities that take place during Continue reading

Cloud Computing Service Models

In practice, cloud service providers tend to offer services (ie. Cloud Computing Service Models)  that can be grouped into three categories: software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (Iaas). 1. Software as a service (SaaS) Software as a service (SaaS)  is software that is developed and hosted by the SaaS vendor and which the end user accesses over the Internet. Unlike traditional applications that users install on their computers or servers, SaaS software is owned by the vendor and runs on computers in the vendor’s data center (or a collocation facility). A single instance of the software runs on the cloud and services multiple end users or client organizations. Broadly speaking, all customers of a SaaS vendor use the same software: these are one-size-fits-all solutions. Well known examples are Salesforce.com, Google’s Gmail and Apps, instant messaging from AOL, Yahoo and Google, and Continue reading