Network Security and Management

by Professor Brijendra Singh.

Friday, 20 April 2018

Impact of Software Development Process

Impact of Software Development Process Software process can be defined as “a set of activities, methods, practices, and transformations that people use to develop and maintain software and the associated products” . According to IEEE software development process is a process by which user needs are translated into a software product. The process involves translating user needs into software requirements, transforming the software requirements into design, implementing the design in code, testing the code, and sometimes, installing and...

Software Development Process

Software Development Process The software process is an organized set of activities required to develop a software product. Software development is the process of taking a set of requirements from a user, analyzing them, designing a solution to the problem, and then implementing solution on a computer. International standard ISO/IEC 12207 describe the method of selecting, implementing, and monitoring the life cycle for software. Waterfall model is a traditional model and agile software development...

Software Quality

Software Quality According to IEEE Standard Glossary of Software Engineering Terminology Std 610.12-1990 quality is defined as: “the degree to which a system, component, or process meets specified requirements” and “the degree to which a system, component, or process meets customer or user needs or expectations”. Basically software quality defined as: conformance to specification and meeting customer needs. Although there are different definitions, it is often described as the fitness for purpose of software. One of...

Saturday, 24 February 2018

Data Warehouse control and security

DATA WAREHOUSE CONTROL AND SECURITY Data Warehouse (DW) is a collection of integrated databases designed to support managerial decision-making and problem-solving functions. It contains both highly detailed and  summarized historical data relating to various categories, subjects or areas. All units of data are relevant to appropriate time horizons. DW is an integral part of enterprise—wide decision support system, does not ordinarily involve data updating. It empowers and end users perform data access and analysis. This...

Monday, 5 February 2018

Goals of Security Infrastructure

Goals of Security Infrastructure The primary goal of a security infrastructure design in the protection of corporate assets. The way we protect these assets is by the proper deployment of security components into an organized and cohesive security infrastructure. Assets may include hardware, software, network components and intellectual property. The controls applied in a protection of these assets should be in line with your corporate security goals as well as your corporate security policy documentation. Though only the protection of data...

Building security Plan

Building Security Plan The basic goals of a network security system are pretty much like the security goals for any kind of computer system. To protect information from accidental destruction or modification. To protect information from deliberate destruction or modification. Make sure the data is available to authorized users, when they need it and in a form they can use. To secure a network system, you will need nearly as much diplomatic sense is technical know-how. For example, you will have to influence people in client department...

Security Procedures

Security Procedures The best physical and technical methods are of little value if your employees do not use them properly. More important you can use procedural methods to conduct your overall business operations. At the same time, you can minimize the degree to which security measures interface with full, productive use of your computers. Procedural security is a set of management and supervisory controls. It includes rules for the use of computers and data, and ways to detect unauthorized use. Data input Data processing Program development Output Communication Storage. Procedural...

Organizational Policy, Security and Infrastructure

p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; text-align: justify; font: 12.0px 'Times New Roman'; color: #000000; -webkit-text-stroke: #000000} p.p2 {margin: 0.0px 0.0px 12.0px 0.0px; text-align: justify; font: 12.0px 'Times New Roman'; color: #000000; -webkit-text-stroke: #000000} span.s1 {font-kerning: none} span.s2 {font: 12.0px 'Trebuchet MS'; font-kerning: none} span.Apple-tab-span {white-space:pre} Organisation Policy, Security and Infrastructure Today, A good manager will know the types and forms of information generated and how...

Friday, 26 January 2018

Happy Republic Day

Dear friends On this special day, let’s promise our motherland thatwe will do everythingto enrich and preserve our heritageour ethos and our treasureHappy Republic Day! ...

Saturday, 20 January 2018

Database Backup and Recovery

DATABASE BACKUP AND RECOVERY  An integral part of any overall database security strategy should be providing for database backup and recovery. Backups serve many different purpose. Most often, in seems that systems administrator perform backups to protect information in the case of server hardware failures. Although this is very real danger in most environments. It is often not the most likely. Data can be lost due to accidental human errors, flawed application logic, defects in the database server or operating system platform and,...

Database security issues

DATABASE SECURITY ISSUES Database security is a very broad area that addresses many issues, including the following: (i) Legal and ethical issues regarding the right to access certain information. Some information may be deemed to be private and cannot be accessed legally by unauthorized persons. (ii) Policy issues at the governmental, institutional, or corporate level as to what kinds of information should not be made publicly available, for example credit ratings and personal medical records. (iii) System-related issues such as the system...

Sunday, 7 January 2018

Software Projects Versus Other Types of Project

p.p1 {margin: 0.0px 0.0px 10.0px 0.0px; text-align: justify; font: 12.0px 'Times New Roman'; color: #000000; -webkit-text-stroke: #000000} span.s1 {font-kerning: none} span.s2 {text-decoration: underline ; font-kerning: none} span.Apple-tab-span {white-space:pre} Software Projects Versus Other Types of Project  Many of the techniques of general project management are applicable to software project management, but product of software projects have certain characteristics which make them different.    (i) Invisibility...

Project Planning and Management

p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; text-align: center; font: 14.0px 'Times New Roman'; color: #000000; -webkit-text-stroke: #000000} span.s1 {font-kerning: none} Project Planning and Management The dictionary definition put a clear emphasis on the project being a planned activity. The definition of a project as being planned assumes that to a large extent we can determine how we are going to carry out a task before we start. There may be some projects of an exploratory nature where this might be quite difficult planning is...