logo

Securing Db2 Database: Steps and Importance of Security

2 Pages673 Words192 Views
   

Added on  2022-10-11

About This Document

This presentation discusses the Db2 database and the steps needed to secure it. It covers the importance of security and the vulnerabilities of UNIX and server. It also talks about the deployment of a web server for Navy intelligence and the use of Apache and IIS for security.

Securing Db2 Database: Steps and Importance of Security

   Added on 2022-10-11

ShareRelated Documents
Hello everyone, good morning everyone. Give a brief introduction about yourself
in 4 lines.
Today I am going to discuss about the Db2 database and the steps that are
needed to secure the backend Db2 database.
Slide 1: IN this slide I am going to discuss the db2 database. The DB2 is a
relational database which can deliver the analytics capabilities and advanced
data for transactional workloads. The Db2 database software includes some of
the advanced features like advanced management, in memory technology,
development tools, workload management, continuous data availability.
Slide 2: On the premises of the optimized database is for delivering the industry
leading performance where the cost is low. The db2 database of IBM is supported
across Unix, Linux based operating systems. With the simplification of Db2
database, the users can use and download the Db2 as long as they want.
Slide 3: In this slide, I am going to discuss the importance of security. Db2
databases can hold the backbone of an entire organisation. The triad of integrity,
confidentiality and availability are the actual foundation of the database security
and information security. Confidentiality is one of the important most aspect for
the security of Db2. This is so much important to maintain the defences and
security practices for combatting the attacks on to the database.
Slide 4: In this slide the table is showing the vulnerabilities UNIX and server.
Slide 5: The hardening of the linux or unix system is going to be discussed in this
slide. Two of the models for the security control for accessing Db2 database
functions and system data. Access to the database (Db2) system can be
managed through the facilities. After the account of the user is authenticated, it
id determined by the database manager that the user has been allowed for
accessing the DB2 resources and data.
Slide 6: In this slide I am going to discuss the Deployment of a Web server to be
used by Navy intelligence for checking on project progress. Before the
deployment of data web services to one of the local server, at least one of the
web server connection. The use of the options that are advanced for configuring
the connections of the web server. The designer of the data web services have to
be opened. If a web server connection has not been configured for opening the
designer for the very first time. With the add ins of the database for the visual
studio, the web services can be created d which can expose the operations of
the database to the client related applications.
Slide 7: In the Db2 database, both the internet information server and apache
server can be connected. Apache is one of the most widely used web based
servers, it runs on linux, unix, windows and Mac OS. On the other side the
Internet information servers runs on windows only. Both the IIS and Apache is
having their own weaknesses and own strong points. The obvious most
advantages of the of IIS id the tight integration with the technologies related to
windows and for Apache is the cross platform.
Slide 8: The architecture of DB2 database is given in this slide.
Slide 9: The versions of db2 are given in the table in the slide.
Securing Db2 Database: Steps and Importance of Security_1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
DB2 Database Assignment 2022
|13
|918
|19

Computer Security-System Investigation
|12
|1368
|37

File Integrity Monitoring Software: Tripwire, Trustwave, ADAudit Plus and Solarwinds
|5
|698
|430

Research Report on Network and Design | LDAP
|10
|2343
|143

Network Vulnerability And Penetration Testing Assignment
|6
|1145
|23

System Architecture and Security Requirements
|7
|751
|78