6 research outputs found

    Penerapan Keamanan Penggunaan Data pada Database Kepegawaian Menggunakan Teknik Transparent Data Encryption (Studi Kasus Sekolah Tinggi Teknologi Payakumbuh)

    Get PDF
    Database kepegawaian yang baik adalah database yang terlindung dari akses orang yang tidak berkepentingan. Meskipun database sudah terlindungi dengan password, belum menjamin amannya sebuah database. Apalagi data tersebut berupa data sensitif atau data yang hanya boleh diketahui oleh orang-orang tertentu, namun ada saja cara yang bisa digunakan untuk mengambil data dan memanipulasinya. Melindungi data dengan teknik Transparent Data Encryption (TDE) mampu mengamankan data semaksimal mungkin. Meskipun data tersebut di copy atau dicuri secara fisik, data tersebut tetap tidak akan bisa dibuka tanpa proses dekripsi TDE. Penelitian ini bertujuan untuk menerapkan sistem keamanan pada database kepegawaian Sekolah Tinggi Teknologi Payakumbuh dengan teknik TDE. Penelitian ini dilakukan dengan cara memisahkan data sensitif dengan data non sensitif, kemudian data sensitif tersebut akan di enkripsi menggunakan algoritma yang disediakan oleh TDE, sehingga diharapkan dapat menjamin terjaganya database dari akses yang tidak diinginka

    Selected Computing Research Papers Volume 2 June 2013

    Get PDF
    An Evaluation of Current Innovations for Solving Hard Disk Drive Vibration Problems (Isiaq Adeola) ........................................................................................................ 1 A Critical Evaluation of the Current User Interface Systems Used By the Blind and Visually Impaired (Amneet Ahluwalia) ................................................................................ 7 Current Research Aimed At Improving Bot Detection In Massive Multiplayer Online Games (Jamie Burnip) ........................................................................................................ 13 Evaluation Of Methods For Improving Network Security Against SIP Based DoS Attacks On VoIP Network Infrastructures (David Carney) ................................................ 21 An Evaluation of Current Database Encryption Security Research (Ohale Chidiebere) .... 29 A Critical Appreciation of Current SQL Injection Detection Methods (Lee David Glynn) .............................................................................................................. 37 An Analysis of Current Research into Music Piracy Prevention (Steven Hodgson) .......... 43 Real Time On-line Analytical Processing: Applicability Of Parallel Processing Techniques (Kushatha Kelebeng) ....................................................................................... 49 Evaluating Authentication And Authorisation Method Implementations To Create A More Secure System Within Cloud Computing Technologies (Josh Mallery) ................... 55 A Detailed Analysis Of Current Computing Research Aimed At Improving Facial Recognition Systems (Gary Adam Morrissey) ................................................................... 61 A Critical Analysis Of Current Research Into Stock Market Forecasting Using Artificial Neural Networks (Chris Olsen) ........................................................................... 69 Evaluation of User Authentication Schemes (Sukhdev Singh) .......................................... 77 An Evaluation of Biometric Security Methods for Use on Mobile Devices (Joe van de Bilt) .................................................................................................................. 8

    Transparent Data Encryption- Solution for Security of Database Contents

    No full text

    Intelligent Buildings in Smart Grids: A Survey on Security and Privacy Issues Related to Energy Management

    Get PDF
    During the last decade, the smart grid (SG) concept has started to become a reality, mainly thanks to the technical progress achieved in telecommunications, informatics and power electronics, among other domains, leading to an evolution of the traditional electrical grid into an intelligent one. Nowadays, the SG can be seen as a system of smart systems that include cyber and physical parts from different technologies that interact with each other. In this context, intelligent buildings (IBs) constitute a paradigm in which such smart systems are able to guarantee the comfort of residents while ensuring an appropriate tradeoff of energy production and consumption by means of an energy management system (EMS). These interconnected EMSs remain the objective of potential cyber-attacks, which is a major concern. Therefore, this paper conducts a survey, from a multidisciplinary point of view, of some of the main security and privacy issues related to IBs as part of the SG, including an overview of EMS, smart meters, and the main communication networks employed to connect IBs to the overall SG. Future research directions towards a security enhancement from both technical and human perspectives are also provided

    Transparent Data Encryption – Solution for Security of Database Contents

    No full text
    <p>Abstract— The present study deals with Transparent Data Encryption which is a technology used to solve the problems of security of data. Transparent Data Encryption means encrypting<br>databases on hard disk and on any backup media. Present day global business environment presents numerous security threats and compliance challenges. To protect against data thefts and<br>frauds we require security solutions that are transparent by design. Transparent Data Encryption provides transparent, standards-based security that protects data on the network, on disk and on backup media. It is easy and effective protection of<br>stored data by transparently encrypting data. Transparent Data Encryption can be used to provide high levels of security to columns, table and tablespace that is database files stored on<br>hard drives or floppy disks or CD’s, and other information that requires protection. It is the technology used by Microsoft SQL Server 2008 to encrypt database contents. The term encryption<br>means the piece of information encoded in such a way that it can only be decoded read and understood by people for whom the information is intended. The study deals with ways to create<br>Master Key, creation of certificate protected by the master key, creation of database master key and protection by the certificate and ways to set the database to use encryption in Microsoft SQL<br>Server 2008.</p> <p> </p
    corecore