5
Islington College Project Specification Document 1. Project Details Project Title: Different Methodology to Secure the Database Student’s Name and Id: Santosh Timilsina 11069922/1 1 st Supervisor name: Mr Tashi Wangdue 2 nd Supervisor: Mr Prakash Shrestha Date Approved: 13 th Nov, 2011 1 Introduction to the Project Database technologies are a core component of many computing systems. They allow data to be retained and shared electronically and the amount of data contained in these systems continues to grow at an exponential rate. Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. The Privacy Rights Clearing House (2010) reports that more than 345 million customer records have been lost or stolen since 2005 when they began tracking data  breach incid ents, and the Po nemon Inst itute repor ts the averag e cost of a data breach has ris en to $202 per customer record (Ponemon, 2009). The Verizon Business Risk Team, who has been reporting data breach statistics since 2004, examined 90 breaches during the 2008 calendar year. They reported that more than 285 million records had been compromised, a number exceeding the combined total from all prior years of study (Baker et al., 2009). Given the increasing number of beaches to database systems, there is a corresponding need to adopt different methodology to secure the database. Database security incorporates a wide array of security topics, like physical security, network security, encryption and authentication etc. Among the different methodologies of database security this project is focused on the backup and recovery methodology. This project focuses on the observation of database  proble ms faced by a bank during operati on. Wit hin this context , diffe rent scenari os are taken into

FYP Specification Computing, Timilsina Santosh, Autumn 11

Embed Size (px)

Citation preview

Page 1: FYP Specification Computing, Timilsina Santosh, Autumn 11

7/31/2019 FYP Specification Computing, Timilsina Santosh, Autumn 11

http://slidepdf.com/reader/full/fyp-specification-computing-timilsina-santosh-autumn-11 1/5

Islington College

Project Specification Document

1. Project Details

Project Title: Different Methodology to Secure the Database

Student’s Name and Id: Santosh Timilsina 11069922/1

1st Supervisor name: Mr Tashi Wangdue

2nd Supervisor: Mr Prakash Shrestha

Date Approved: 13th

Nov, 2011

1 Introduction to the Project

Database technologies are a core component of many computing systems. They allow data to be retained

and shared electronically and the amount of data contained in these systems continues to grow at an

exponential rate.Database security is a growing concern evidenced by an increase in the number of reported incidents of 

loss of or unauthorized exposure to sensitive data. The Privacy Rights Clearing House (2010) reports that

Page 2: FYP Specification Computing, Timilsina Santosh, Autumn 11

7/31/2019 FYP Specification Computing, Timilsina Santosh, Autumn 11

http://slidepdf.com/reader/full/fyp-specification-computing-timilsina-santosh-autumn-11 2/5

Islington College

consideration and a proper procedure of database backup and recovery will be suggested to ensure all data

are available although hacked or mishandled.

This case study will be carried out in Global Bank, situated in Kathmandu Nepal, in a database

environment using Oracle 10g as Database management System.

2 Aims of the project

The aim of this project is to find out how database backup and recovery methodology, among different

methodology to secure database can be used to secure the data of Global bank Ltd, where Oracle 10g is

used as DBMS, based on the different cases of problem faced. So that at any circumstances like system

failure, system crash, database crash, theft hacking etc all the data are retained properly without loss and

inconsistency.

3 Deliverables of the project

With the end of the project, a comprehensive report of different cases of database security related

 problems solved using the backup and recovery methodology of database security would serve as a

reference guide and solutions for similar problems in future.

The following things are delivered at the end of the project:

Page 3: FYP Specification Computing, Timilsina Santosh, Autumn 11

7/31/2019 FYP Specification Computing, Timilsina Santosh, Autumn 11

http://slidepdf.com/reader/full/fyp-specification-computing-timilsina-santosh-autumn-11 3/5

Islington College

4 Suggested Starting Point

I will visit the Global Bank Ltd located in Kathmandu. I will inquire to the database personnel about the

DBMS being used and inform them about this research. Based on the information provided by them I will

 plan for further steps. I will gain the information about the techniques they are using in comparison with

the global trend. To get the information about database technology used in global market I will go through

documents review. After that I will get acquainted with the problems during the database operations.

5 Estimated Costing and Resources Required

This project requires a database environment to carry on this research. For this, I will use the real-time

database environment of the Global Bank. And for the testing purpose, I would set up a testing

environment on this laptop and carry out the testing.

Page 4: FYP Specification Computing, Timilsina Santosh, Autumn 11

7/31/2019 FYP Specification Computing, Timilsina Santosh, Autumn 11

http://slidepdf.com/reader/full/fyp-specification-computing-timilsina-santosh-autumn-11 4/5

Islington College

6 Bibliography/References

Baker,W. H., Hutton, A., Hylender, C. D., Novak, C., Porter, C., Sartin, B., Tippett, P., & Valentine, J. A.

(2009). The 2009 data breach investigations report . Verizon Business.

Defense Information Systems Agency. (2004). Database security technical implementation guide, 7(1).

Department of Defense.

Ponemon, L. (2009). Fourth annual US cost of data breach study. Poneomon Institute sponsored by PGP

Corporation.

Privacy Rights Clearing House. (2010). Chronology of data breaches

Page 5: FYP Specification Computing, Timilsina Santosh, Autumn 11

7/31/2019 FYP Specification Computing, Timilsina Santosh, Autumn 11

http://slidepdf.com/reader/full/fyp-specification-computing-timilsina-santosh-autumn-11 5/5

Islington College

ID Task Name Start Finish Duration

Nov 2011 Dec 2011

4/12 1/1 8/1 15/1 22/1 29/1 5/2  

2 1d11/8/201111/8/2011Project Selection and Preliminary

 Analysis

13d11/22/201111/8/2011Initial Planning and Project Approval

6 7d11/22/201111/15/2011Get the information of Database

Technology and techniques being used

7 45d1/13/201211/23/2011Literature Review and trainings

10

5

3d11/11/201111/9/2011Feasibility study

4 0d11/13/201111/13/2011Proposal Submission along with the

Project Plan

3

1

2d11/14/201111/13/2011Get approval and Appointed in the Bank

20d4/17/20123/26/2012Analysis of Data and Validation

9d1/27/20121/18/2012Prepare Research Design

12

13

17

18

3d1/27/20121/25/2012Cunstruction of Research Tool

45d3/20/20121/29/2012Collection of Data

7d4/25/20124/18/2012Generalization and Interpretation

0d3/25/20123/25/2012Problems log

10d5/7/20124/26/2012Report Prepatation

19 0d5/9/20125/9/2012Final Report Submission

Jan 2012 Feb 2012 Mar 2012 Apr 2012  

12/2 19 /2 26 /2 4 /3 11 /3 18 /3 25 /3 1/4 8/4 15 /4 22 /4 29 /4 6/5  

9 2d1/17/20121/16/2012Develop Objective

11 6d1/24/20121/18/2012Sample Design

15

May 2012 

14

16 0d4/17/20124/17/2012Maintenance Log

8 0d1/15/20121/15/2012Interim Report Submission