학교/CS15 Lecture 7 pt1 : Database Security 목차 Database Driven Websites There is a web application running. The server processes the user input and access the databasse with the input. Student data stored into database Access to database mediated by server Handling Input in a Database Databases organize data A database management system (DBMS) is the system responsible for managing the data and handling the interaction with the user (데이터베.. 2024. 3. 18. Lecture 6: OS - Level Security 목차 Learning Objectives - Understand what is access control - Be able to explain how OSs enforce access control - Reason about pros/cons of different access control mechanisms and policies What is an Operating System (OS)? An operating system provides a useful way to interface with the hardware Hardware resources are accessed through abstractions provided by the OS (e.g. CPU, Memory, Files, Netwo.. 2024. 3. 3. Lecture 5: Internet security 목차 Internet Security Phishing Phishing: attack that attempts to steal your money, or your identity, by getting you to reveal personal information on websites that pretend to be legitimate. Protocols Internet Protocols are a set of rules that governs the communication and exchange of data over the internet. Both the sender and receiver should follow the same protocols to communicate. Many protoco.. 2024. 3. 3. Lecture 4: Firewalls and Intrusion detection 목차 Firewall In Computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet. Firewalls divide the untrusted outside of a network from the more trusted interior of a network. The importance.. 2024. 3. 3. 이전 1 2 3 4 다음 반응형