Security in Database Systems

Author(s):  
Eduardo Fernandez-Medina Paton ◽  
Mario G. Piattini

Rapid technological advances in communications, transport, banking, manufacturing, medicine and other fields are demanding more sophisticated information requirements in organizations worldwide. As a result, large quantities of data must be handled, while a high level of security must be maintained in order to ensure information needs are met. The alarming growth in electronic crime is forcing organizations to take a look at how information systems can maintain security while meeting the technological needs of real-time systems in a global market. It is important therefore, that in information systems analysis and design, security requirements are taken into account.

Author(s):  
Surya B. Yadav

The extent methods largely ignore the importance of integrating security requirements with business requirements and providing built-in steps for dealing with these requirements seamlessly. To address this problem, a new approach to secure network analysis and design is presented. The proposed method, called the SEACON method, provides an integrated approach to use existing principles of information systems analysis and design with the unique requirements of distributed secure network systems. We introduce several concepts including security adequacy level, process-location-security matrix, datalocation- security matrix, and secure location model to provide built-in mechanisms to capture security needs and use them seamlessly throughout the steps of analyzing and designing secure networks. This method is illustrated and compared to other secure network design methods. The SEACON method is found to be a useful and effective method.


Author(s):  
Vivienne Waller ◽  
Robert B. Johnston ◽  
Simon K. Milton

This chapter presents a new high level methodology for the analysis and design of information systems specifically to support routine action at the operational level of organizations. The authors argue that traditional methods fail to adequately address the unique requirements of support for routine operational action. The main innovation of the methodology is the use of an action-centred approach derived from recent work on the nature of purposeful human action, and as such, emphasises both the information requirements for action and the dependence of action upon appropriately structured environments. A brief case study illustrates how using the methodology can sensitize the analyst to opportunities to increase human efficiency and effectiveness through lighter weight information systems.


2017 ◽  
Vol 8 (2) ◽  
pp. 1-25
Author(s):  
Christos Kalloniatis ◽  
Argyri Pattakou ◽  
Evangelia Kavakli ◽  
Stefanos Gritzalis

Pervasiveness of information systems is well underway, redefining our social and economic relationships. This technological revolution has generated enormous capabilities, but also enabled the creation of new vulnerabilities and threats. A major challenge in the field of information systems is therefore, to ensure the trustworthiness of the underlying technologies that make possible the generation, collection, storage, processing and transmission of user data at rates more intensive than ever before. Trust in information systems depends on different aspects, one of which is the security of user's data. Data security is referred as the protection of user's data from corruption and unauthorized access. Another important aspect of trust is the protection of user's privacy. Protecting privacy is about complying with user's desires when it comes to handling personal information. Without security to guarantee data protection, appropriate uses of that data cannot be realized. This implies that security and privacy issues are inherently intertwined and should be viewed synergistically. The aim of this paper is to elevate modern practices for ensuring security and privacy during software systems analysis and design. To this end, the basic security and privacy requirements that should be considered are introduced. Additionally, a number of well known methods in the research area of requirements engineering which focus on eliciting and modeling security and privacy requirements are described. Finally, a comparative analysis between these methods is presented.


Author(s):  
Judith Kabeli ◽  
Peretz Shoval

FOOM (Functional and Object-Oriented Methodology) is an integrated methodology for information systems’ analysis and design, which combines two essential software-engineering paradigms: the functional/data approach (or process-oriented) and the object-oriented (OO) approach. Having applied FOOM in a variety of domains, this chapter presents the application of the methodology to the specification of the IFIP Conference system. We focus on the analysis and design phases. FOOM-analysis phase includes data modeling and functional analysis activities and produces an initial Class Diagram and a hierarchy of OO data flow diagrams (OO-DFDs). The products of the design phase include: (a) a complete class diagram; (b) object classes for the menus, forms and reports and (c) a behavior schema, which consists of detailed descriptions of the methods and the application transactions, expressed in pseudocode and message diagrams.


Sign in / Sign up

Export Citation Format

Share Document