You are on page 1of 2

Business Intelligence tools PerformancePoint Services can help users across an organization make informed business decisions that

align with companywide objectives and strategy. PerformancePoint Services provides the ability to pull multiple view types into a single dashboard. In a PerformancePoint Services dashboard, users can interact with SSRS reports, cube-based graphs, performance maps, decomposition trees and Visio diagrams,
a dashboard is a user interface that, somewhat resembling an automobile's dashboard, organizes and presents information in a way that is easy to read. Transmission Control Protocol, manages the assembling of a message or file into smaller packets that are transmitted over the Internet and received by a TCP layer that reassembles the packets into the original message. The lower layer, Internet Protocol, handles the address part of each packet so that it gets to the right destination.

Legacy systems utilize outmoded programming languages, software and/or hardware that typically are no longer supported by the respective vendors.
A data manipulation language (DML) is a family of syntax elements similar to a computer programming language used for inserting, deleting and updating data in a database. Performing read-only queries of data is sometimes also considered a component of DML. A popular data manipulation language is that of Structured Query Language (SQL), which is used to retrieve and manipulate data in a relational database.[1 A SQL injection is often used to attack the security of a website by inputting SQL statements in a web form to get a badly designed website to perform operations on the database (often to dump the database content to the attacker) other than the usual operations as intended by the designer. SQL injection is a code injection technique that exploits a security vulnerability in a website's software.

Audit trail electronic or paper log used to track computer activity


Physical access is a term in computer security that refers to the ability of people to physically gain access to a computer system. In computer security, being able to interact with data through access control procedures such as identification, authentication and authorization. Contrast with physical access. In computer security, being able to physically touch and interact with the computers and network devices. It lets someone insert a boot disk in the machine and bypass normal operating system controls. Physical access enables people to install unauthorized snooping equipment such as keystroke loggers

Query-level access control mechanism that restricts data privileges to minimum-required SQL operations (SELECT, UPDATE etc). Controlled database access mechanism by enforcing policy for client application, time of delay, location etc through which it is possible to identify users who are using Legitimate database access privileges in a suspicious manner.

Database Platform Vulnerabilities controlled by combination of regular softwares updates (Patches) and Intrusion prevention systems (IPS). SQL Injection controlled by 3 techniques (IPS, query-level access, event correlation). Strong audit trail have 4 levels of combinations (Network level, OS level, database level , query level). DOS prevention requires protection at multiple levels (Network, application, and database level protections are all necessary). Physical/Logical access controlled by software and hardware firewalls, strong authentication rules, strong password techniques etc. Licensed Anti-Viruses servers installation.

Licensed Anti-Spyware

You might also like