摘要:面对各种各样的攻击,尽管数据库系统采取了各种保护措施来防止数据库的安全性和完整性被破坏,保证并发事务的正确执行,但故障仍是不可避免的。因此,数据库的备份与恢复成为一项不可忽视的非常重要的系统管理工作,是整个安全的基础之一。进行数据库备份和恢复能增强系统可靠性,最大限度地减少因硬件、软件故障而造成数据丢失。
and the system administrators to effectively perform the backup system . System Backup The ultimate aim is to protect the smooth operation of the network system , so a good network backup program should be able to back up all data on the system , the network is down or damaged, can quickly restore network systems and data. Failure to fully recover from the discovery of the system , the ideal backup solution should not take longer than half a day . Thus, if a catastrophic system failure , people can minimize the loss .
Database Recovery is when a hardware computer system corruption, software errors , user errors and unexpected power outages and other accidents , resulting in the database data distortion or loss of data , the use of database backup files and journal backup to restore the database to a correct state of a process . Database recovery is accomplished by loading the backup and the transaction log backups , data protection process. When the database is restored to the state when the backup from the backup status for all subsequent update transactions must be re- run in order to return to the fault state.
Database recovery mainly depends on the fault condition occurs , depending on database backup solutions , noted in the different anomalies through backup varying degrees of recovery . If the data file is corrupted , simply corrupted files from the backup will be restored to its original position , re- load the database . If the control file is damaged , you need to close the database , the corresponding control from a backup file recovery to the original position . In the process of restoring the database , the system will automatically perform security checks , including database and its associated files and reconstruction operations , ensure that the database safely and quickly restored.
Developers write code before the official , in which the following aspects need to be considered .
1 ) Using Windows Authentication
Use Windows authentication , we do not store the database connection with embedded credentials cameo , but also from a security account and password management strategies to benefit .
2 ) Use least privileged account
Benefits of using least-privileged account , if the account is damaged or inject malicious code , it will reduce the risk of attack to a minimum, thus limiting possible damage .
3 ) Use the stored procedure [ 18 ]
To ensure data security and integrity . Through stored procedures , you can make without permission , under control , indirect access to the database , thus ensuring data security. Through stored procedures and related actions together can occur , which can maintain the integrity of the database . Can improve the security of application system to prevent SQL injection attacks. Can improve the performance of the system response .
4 ) using different data access assembly
If we are in the design process can have a full selection of space, data access logic should be placed in separate assemblies , and to achieve a logical data access layer. Do so in a safe , reuse and maintenance have many advantages.
5 ) Using parameterized commands , avoid dynamic SQL statements ; Do not use server-side error message is returned to the client application design ; to use a database to enable security auditing and logging , so that when you get any security breach a
本论文由英语论文网提供整理,提供论文代写,英语论文代写,代写论文,代写英语论文,代写留学生论文,代写英文论文,留学生论文代写相关核心关键词搜索。