Database Security Threats and Countermeasures

Information is very critical asset. Organizations create so much information and they use database systems to handle the information within them to automate various functions. Due to information importance, information protection is a critical component of the database management system. Information security is the goal of a database management system (DBMS), also called database security. To be able to manage a huge amount of data effectively and fast, a well organized system is needed to build. It will also need to store and retrieve data easily. Generally, a database system is designed to be used by many users simultaneously for the specific collections of data. Databases are classified based on their types of collections, such as images, numeric, bibliographic or full-text. Digitized databases are created by using management system to make, store, maintain or search the data. Oracle, MS SQL and Sybase servers are mostly used in companies, agencies and Continue reading

Different Security Attacks on RFID Systems

Like other information systems, RFID systems are vulnerable to attack and can be compromised at various stages. Generally the attacks against a RFID system can be categorized into four major groups: attacks on authenticity, attacks on integrity, attacks on confidentiality, and attacks on availability. Besides being vulnerable to common attacks such as eavesdropping, man-in-the-middle and denial of service, RFID technology is, in particular, susceptible to spoof and power attacks. This section illustrates the different kinds of attacks on RFID systems. Eavesdropping: Since an RFID tag is a wireless device that emits a unique identifier upon interrogation by a RFID reader, there exists a risk that the communication between tag and reader can be eavesdropped. Eavesdropping occurs when an attacker intercepts data with any compliant reader for the correct tag family and frequency while a tag is being read by an authorized RFID reader. Since most RFID systems use clear text Continue reading

E-Commerce – Definition, History and Types

Electronic commerce (e-commerce) is the term used for any type of business or commercial transaction that involves the transfer of products, services and information over electronic systems such as the internet and other computer networks. The trader and customer are not face to face at any point during these transactions, the business being conducted remotely, regardless of location. E-commerce covers a range of different types of businesses, from consumer based retail sites, through auction or music sites, to business exchanges trading goods and services between corporations. It is currently one of the most important aspects of the Internet to emerge. Almost all big retailers have electronic commerce presence on the World Wide Web. E-Commerce includes transactions within a global Information Economy such as electronic trading of goods and services, online delivery of digital content, electronic funds transfer, electronic share trading, electronic bills of lading, commercial auctions, collaborative designs, engineering and Continue reading

A Phased Approach to Software Development

A software comprises of programs and associated data and documentation. Each of these items is a part of software development process. Software development process  is a structure imposed on the development of a software product. The process includes the phased approach to software development, software development models, the software development processes and the software project management processes.The main problems for software development currently are: high cost, low quality and frequent changes causing change and rework. Software has become a limiting factor in the evolution of computer-based systems. The intent of software development is to produce a framework for building higher quality software. In order to achieve successful and quality software certain methods and criteria need to be followed. These methods and criteria are classified as the software development processes. There are several models for such processes, each describing approaches to a variety of tasks or activities that take place during Continue reading

Characteristics of a Distributed System

Distributed Systems is an upcoming area in computer science and has the ability to have a large impact on the many aspects in  the medical, scientific, financial and commercial sector. The most commonly used definition for a distributed system is, a system comprised of geographically dispersed computing components interacting on a hardware or software level. The rise in interest for distributed computing can be attributed to two major factors. The first factor is the creation and advancements in local and wide area networks which allow for large amounts of data to be transmitted over great distances in a short period of time. The second factor is the new craze of the Internet of Things (IoT), where nearly every physical device manufacture having some sort of internet connectivity allowing for the possibility of tens of billions of devices that are able to interact. This large network of interconnected devices can be Continue reading

Information Visualization

Information visualization is the process of showing the data in a graphical display which we cannot explain using words and text. In other words information visualization is a set of technologies that use visual computing to amplify human cognition with abstract information. The greatest advantage of information visualization is its ability to show the amounts of information that are beyond the capacity of textual display. Information visualization can significantly improve productivity. Users can explore large amounts of data, rapidly assimilate information from many sources, reason with it, understand it and create new knowledge based on it. With the right visual picture, people can make better decisions, faster, backed with more information. One of the most obvious benefits of information visualization is helping people see trends and anomalies in data, which can be particularly valuable in real-time environments. Visual techniques such as heat maps and tree maps, which help reveal patterns Continue reading