procedures for protecting a database
Download
Skip this Video
Download Presentation
Procedures for Protecting a Database

Loading in 2 Seconds...

play fullscreen
1 / 10

Procedures for Protecting a Database - PowerPoint PPT Presentation


  • 77 Views
  • Uploaded on

Procedures for Protecting a Database. Better worlds through database protection. SAFETY MATTERS. Removing the alien element. Don’t forget to write. First line of defense. Human intervention fortification. Image courtesy of Colonial Marines. Better worlds through database protection.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Procedures for Protecting a Database' - jafari


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
better worlds through database protection
Better worlds through database protection

SAFETY MATTERS

Removing the alien element

first line of defense
First line of defense

Human

intervention

fortification

Image courtesy of Colonial Marines

Better worlds through database protection

slide5

Statistics suggest that ne·far·i·ous activities involving your database occur…

MOSTLY AT NIGHT...

MOSTLY AT NIGHT…

MOSTLY…

EVEN WHEN IT’S RAINING…

Better worlds through database protection

slide6

SLEEP BETTER

FOLLOWING SOME

BASIC RULES

Better worlds through database protection

slide7

Simple ways to add a few layers of security to a database

  • 1: Check and reset settings using the Auto Exec macro
  • 2: Hide the Database window
  • 3: Bypass the bypass
  • 4: Split the database
  • 5: Avoid Compact On Close

Better worlds through database protection

slide8

6: Hide objects — a subtle form of protection

  • 7: Use error handling to protect code
  • 8: Password-protect the database
  • 9: Convert to mde or accde format
  • 10: Password-protect the system

Better worlds through database protection

slide9

POINTS TO REMEMBER

LT. ELLEN RIPLEY

When all else fails

locate and contact

this woman

She may

not save you

but she can

certainly save

your database

Don’t panic

and lose your head

like this

unfortunate

synthetic life form

Better worlds through database protection

ad