Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Computer networks presentation, Slides of Computer Networks

computer networks notes slide presentation

Typology: Slides

2022/2023

Uploaded on 11/22/2023

dhairya-mehta
dhairya-mehta 🇮🇳

1 document

1 / 9

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
D037 Dhairya Mehta
D020 Aayush Mhamunkar
MIS SECURITY BASED ON
CLIENT-SERVER
ARCHITECTURE
pf3
pf4
pf5
pf8
pf9

Partial preview of the text

Download Computer networks presentation and more Slides Computer Networks in PDF only on Docsity!

D037 Dhairya Mehta D020 Aayush Mhamunkar

MIS SECURITY BASED ON

CLIENT-SERVER

ARCHITECTURE

Management Information System (MIS) is one of the five major Computer Based Information

Systems (CBIS). Its purpose is to meet the general information needs of the managers in a firm

or organization. MIS is a computer-based system that makes information available to users

with similar needs. Management Information System (MIS) consists of the following three

pillars:

  • Management,
  • Information,
  • System.

WHAT IS MIS?

SYSTEM MANAGEMENT INFORMATION

  • To achieve data security control, MIS relies on a database management system (DBMS), such as SYBASE DBMS. This system utilizes user authority levels to safeguard data.
  • The protection of SYBASE data involves establishing a connection between SYBASE and MIS users, and assigning or removing specific data manipulation commands to ensure that only authorized users can access the data.
  • When developing the system, user authorities are created to grant access to specific data sources and enable certain data manipulations.

DATABASE LEVEL SECURITY

NETWORK LEVEL SECURITY

  • Computer networks have become increasingly important for the successful practice of MIS. Network-level security controls are set up between clients and servers or close to them.
  • The server typically utilizes the safety control strategies of a network operating system to protect the whole system.
  • On the client side, the network operating system's safety features are transparent to the user. Once access authorities are set up on the server, the client user can access the resources specified by the rules.
  • MIS at the network level security control uses safety control mechanisms provided by the network operating system.
  • If a higher level of security is required, more strict safety policies are adopted, such as the use of encryption and decryption technologies for data transmission between clients and servers.

Application-Level Security

Definition of User Authority Define user authority for MIS by creating two tables: the users table and the program modules table. To control user access at the window, object, and event levels, design several control object tables to define each basic control unit. These tables provide support for controlling user authority. Controlling of User Authorities We can control user manipulation in corresponding levels using control object tables. To do this, we establish four checking functions that can be called at every level of the MIS system. When a user attempts to open or use an MIS application object, the definitions given by the tables are used to control the user's manipulation; if the user is permitted, the window is opened otherwise, it is refused.

CONCLUSION

This paper considers the safety control policy at the MIS application level, which is implemented in several large MIS and is proven to fit different demands of MIS safety. It has good adaptation, practical value, and fine effect. The illustration is needed that more levels more system overheads. So users' authority policy should be established according to the practical needs of MIS.