Procedures for protecting a database
This presentation is the property of its rightful owner.
Sponsored Links
1 / 10

Procedures for Protecting a Database PowerPoint PPT Presentation


  • 50 Views
  • Uploaded on
  • Presentation posted in: General

Procedures for Protecting a Database. Better worlds through database protection. SAFETY MATTERS. Removing the alien element. Don’t forget to write. First line of defense. Human intervention fortification. Image courtesy of Colonial Marines. Better worlds through database protection.

Download Presentation

Procedures for Protecting a Database

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Procedures for protecting a database

Procedures for Protecting a Database


Better worlds through database protection

Better worlds through database protection

SAFETY MATTERS

Removing the alien element


Procedures for protecting a database

Don’t forget to write


First line of defense

First line of defense

Human

intervention

fortification

Image courtesy of Colonial Marines

Better worlds through database protection


Procedures for protecting a database

Statistics suggest that ne·far·i·ous activities involving your database occur…

MOSTLY AT NIGHT...

MOSTLY AT NIGHT…

MOSTLY…

EVEN WHEN IT’S RAINING…

Better worlds through database protection


Procedures for protecting a database

SLEEP BETTER

FOLLOWING SOME

BASIC RULES

Better worlds through database protection


Procedures for protecting a database

Simple ways to add a few layers of security to a database

  • 1: Check and reset settings using the Auto Exec macro

  • 2: Hide the Database window

  • 3: Bypass the bypass

  • 4: Split the database

  • 5: Avoid Compact On Close

Better worlds through database protection


Procedures for protecting a database

  • 6: Hide objects — a subtle form of protection

  • 7: Use error handling to protect code

  • 8: Password-protect the database

  • 9: Convert to mde or accde format

  • 10: Password-protect the system

Better worlds through database protection


Procedures for protecting a database

POINTS TO REMEMBER

LT. ELLEN RIPLEY

When all else fails

locate and contact

this woman

She may

not save you

but she can

certainly save

your database

Don’t panic

and lose your head

like this

unfortunate

synthetic life form

Better worlds through database protection


This concludes the presentation

This concludes the presentation


  • Login