بتاريخ: 10 أغسطس 201015 سنة comment_198499 Dear Friendsyou can read a lot of books, material, publications to own your knowledge base, but most of professional DB security analysers and most of DB security companies use Ron Ben Natan book (Implementing Database Security and Auditing) as main reference because it contains simple and practical materials for most database used (Oracle, Sybase, DB2, MS SQL and MySQL) , you can consider this book as your first reference but it's not the last, but you have to understand it well, mainly look at the concept and try to read it 3 times with LAP.below is the link in my google document account: http://docs.google.com/fileview?id=0B6l0Toe9ijjPOGIxYTEwNjktMzdjNy00M2NjLTk3YzctNDhlOWRmMjBhNjRm&hl=en&authkey=CMzEgoUFgoto above link and download the file, to start discuss the introduction in chapter 1 and the concept of defence-in-depth strategy.Awaiting for your feedbackThank youMohamed تقديم بلاغ
بتاريخ: 10 أغسطس 201015 سنة comment_198512 It does need reply it needs saying Milions of Thanks dear Respected team let's download the book and interact with Chapter 1regards, تقديم بلاغ
بتاريخ: 10 أغسطس 201015 سنة comment_198515 Thank you very muchgo on iam with youHossam تم تعديل 10 أغسطس 201015 سنة بواسطة ENG_HOSSAM_WALLY تقديم بلاغ
بتاريخ: 10 أغسطس 201015 سنة كاتب الموضوع comment_198516 Dear BrothersKindly read chapters 1 and 2 to start discussionlet's try to understand Defence-in-Depth concept first.you can get additional material for Depth-in-Defence here: http://securedb.blogspot.com/2010/07/introduction-area-of-it-security-is-one.htmlKindly try to use only official materials from DISA (US Defence Information System Agency) or www.sans.orgKindly note we are gonna discuss Defence-in-Depth strategy.Thank you تقديم بلاغ
بتاريخ: 11 أغسطس 201015 سنة كاتب الموضوع comment_198599 SalamRamadan KareemIf you start reading above book, you can use this material to understand the Desfense-in-Depth strategyKindly download from this link:http://docs.google.com/fileview?id=0B6l0Toe9ijjPYjhmMGQwZDAtN2I0My00OGUxLWIyMDYtMzMyOGE4MDFlOGZk&hl=en&authkey=CI7Jt8IBNow the question isYou have internal network LAN and DMZ, suggest the secure location for your database server.... LAN or DMZ? we are gonna apply this simple model for small business database , obviously the enterprise DB use same roles.Thank youMohamed تقديم بلاغ
انضم إلى المناقشة
يمكنك المشاركة الآن والتسجيل لاحقاً. إذا كان لديك حساب, سجل دخولك الآن لتقوم بالمشاركة من خلال حسابك.