Upload
santosh-timilsina
View
214
Download
0
Embed Size (px)
Citation preview
7/31/2019 FYP Specification Computing, Timilsina Santosh, Autumn 11
http://slidepdf.com/reader/full/fyp-specification-computing-timilsina-santosh-autumn-11 1/5
Islington College
Project Specification Document
1. Project Details
Project Title: Different Methodology to Secure the Database
Student’s Name and Id: Santosh Timilsina 11069922/1
1st Supervisor name: Mr Tashi Wangdue
2nd Supervisor: Mr Prakash Shrestha
Date Approved: 13th
Nov, 2011
1 Introduction to the Project
Database technologies are a core component of many computing systems. They allow data to be retained
and shared electronically and the amount of data contained in these systems continues to grow at an
exponential rate.Database security is a growing concern evidenced by an increase in the number of reported incidents of
loss of or unauthorized exposure to sensitive data. The Privacy Rights Clearing House (2010) reports that
7/31/2019 FYP Specification Computing, Timilsina Santosh, Autumn 11
http://slidepdf.com/reader/full/fyp-specification-computing-timilsina-santosh-autumn-11 2/5
Islington College
consideration and a proper procedure of database backup and recovery will be suggested to ensure all data
are available although hacked or mishandled.
This case study will be carried out in Global Bank, situated in Kathmandu Nepal, in a database
environment using Oracle 10g as Database management System.
2 Aims of the project
The aim of this project is to find out how database backup and recovery methodology, among different
methodology to secure database can be used to secure the data of Global bank Ltd, where Oracle 10g is
used as DBMS, based on the different cases of problem faced. So that at any circumstances like system
failure, system crash, database crash, theft hacking etc all the data are retained properly without loss and
inconsistency.
3 Deliverables of the project
With the end of the project, a comprehensive report of different cases of database security related
problems solved using the backup and recovery methodology of database security would serve as a
reference guide and solutions for similar problems in future.
The following things are delivered at the end of the project:
7/31/2019 FYP Specification Computing, Timilsina Santosh, Autumn 11
http://slidepdf.com/reader/full/fyp-specification-computing-timilsina-santosh-autumn-11 3/5
Islington College
4 Suggested Starting Point
I will visit the Global Bank Ltd located in Kathmandu. I will inquire to the database personnel about the
DBMS being used and inform them about this research. Based on the information provided by them I will
plan for further steps. I will gain the information about the techniques they are using in comparison with
the global trend. To get the information about database technology used in global market I will go through
documents review. After that I will get acquainted with the problems during the database operations.
5 Estimated Costing and Resources Required
This project requires a database environment to carry on this research. For this, I will use the real-time
database environment of the Global Bank. And for the testing purpose, I would set up a testing
environment on this laptop and carry out the testing.
7/31/2019 FYP Specification Computing, Timilsina Santosh, Autumn 11
http://slidepdf.com/reader/full/fyp-specification-computing-timilsina-santosh-autumn-11 4/5
Islington College
6 Bibliography/References
Baker,W. H., Hutton, A., Hylender, C. D., Novak, C., Porter, C., Sartin, B., Tippett, P., & Valentine, J. A.
(2009). The 2009 data breach investigations report . Verizon Business.
Defense Information Systems Agency. (2004). Database security technical implementation guide, 7(1).
Department of Defense.
Ponemon, L. (2009). Fourth annual US cost of data breach study. Poneomon Institute sponsored by PGP
Corporation.
Privacy Rights Clearing House. (2010). Chronology of data breaches
7/31/2019 FYP Specification Computing, Timilsina Santosh, Autumn 11
http://slidepdf.com/reader/full/fyp-specification-computing-timilsina-santosh-autumn-11 5/5
Islington College
ID Task Name Start Finish Duration
Nov 2011 Dec 2011
4/12 1/1 8/1 15/1 22/1 29/1 5/2
2 1d11/8/201111/8/2011Project Selection and Preliminary
Analysis
13d11/22/201111/8/2011Initial Planning and Project Approval
6 7d11/22/201111/15/2011Get the information of Database
Technology and techniques being used
7 45d1/13/201211/23/2011Literature Review and trainings
10
5
3d11/11/201111/9/2011Feasibility study
4 0d11/13/201111/13/2011Proposal Submission along with the
Project Plan
3
1
2d11/14/201111/13/2011Get approval and Appointed in the Bank
20d4/17/20123/26/2012Analysis of Data and Validation
9d1/27/20121/18/2012Prepare Research Design
12
13
17
18
3d1/27/20121/25/2012Cunstruction of Research Tool
45d3/20/20121/29/2012Collection of Data
7d4/25/20124/18/2012Generalization and Interpretation
0d3/25/20123/25/2012Problems log
10d5/7/20124/26/2012Report Prepatation
19 0d5/9/20125/9/2012Final Report Submission
Jan 2012 Feb 2012 Mar 2012 Apr 2012
12/2 19 /2 26 /2 4 /3 11 /3 18 /3 25 /3 1/4 8/4 15 /4 22 /4 29 /4 6/5
9 2d1/17/20121/16/2012Develop Objective
11 6d1/24/20121/18/2012Sample Design
15
May 2012
14
16 0d4/17/20124/17/2012Maintenance Log
8 0d1/15/20121/15/2012Interim Report Submission