Securing Db2 Database: Steps and Importance of Security

Verified

Added on  2022/10/11

|2
|673
|192
AI Summary
This presentation discusses the Db2 database and the steps needed to secure it. It covers the importance of security and the vulnerabilities of UNIX and server. It also talks about the deployment of a web server for Navy intelligence and the use of Apache and IIS for security.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Hello everyone, good morning everyone. Give a brief introduction about yourself in 4 lines.
Today I am going to discuss about the Db2 database and the steps that are needed to secure the
backend Db2 database.
Slide 1: IN this slide I am going to discuss the db2 database. The DB2 is a relational database which
can deliver the analytics capabilities and advanced data for transactional workloads. The Db2
database software includes some of the advanced features like advanced management, in memory
technology, development tools, workload management, continuous data availability.
Slide 2: On the premises of the optimized database is for delivering the industry leading performance
where the cost is low. The db2 database of IBM is supported across Unix, Linux based operating
systems. With the simplification of Db2 database, the users can use and download the Db2 as long as
they want.
Slide 3: In this slide, I am going to discuss the importance of security. Db2 databases can hold the
backbone of an entire organisation. The triad of integrity, confidentiality and availability are the
actual foundation of the database security and information security. Confidentiality is one of the
important most aspect for the security of Db2. This is so much important to maintain the defences
and security practices for combatting the attacks on to the database.
Slide 4: In this slide the table is showing the vulnerabilities UNIX and server.
Slide 5: The hardening of the linux or unix system is going to be discussed in this slide. Two of the
models for the security control for accessing Db2 database functions and system data. Access to the
database (Db2) system can be managed through the facilities. After the account of the user is
authenticated, it id determined by the database manager that the user has been allowed for
accessing the DB2 resources and data.
Slide 6: In this slide I am going to discuss the Deployment of a Web server to be used by Navy
intelligence for checking on project progress. Before the deployment of data web services to one of
the local server, at least one of the web server connection. The use of the options that are advanced
for configuring the connections of the web server. The designer of the data web services have to be
opened. If a web server connection has not been configured for opening the designer for the very
first time. With the add ins of the database for the visual studio, the web services can be created d
which can expose the operations of the database to the client related applications.
Slide 7: In the Db2 database, both the internet information server and apache server can be
connected. Apache is one of the most widely used web based servers, it runs on linux, unix, windows
and Mac OS. On the other side the Internet information servers runs on windows only. Both the IIS
and Apache is having their own weaknesses and own strong points. The obvious most advantages of
the of IIS id the tight integration with the technologies related to windows and for Apache is the
cross platform.
Slide 8: The architecture of DB2 database is given in this slide.
Slide 9: The versions of db2 are given in the table in the slide.
Slide 10: Use of apache and iIS for security is going to be discussed in this slide. For the perspective
of security, the choice between Apache and IIS is debatable. The security of web server, is as good as
the operating system that is underlying. The consideration of the skills of the system admin rights to
the operating system.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Thank you everyone.
1 out of 2
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]