Current location - Education and Training Encyclopedia - Graduation thesis - Overview of Computer Network Security Papers
Overview of Computer Network Security Papers
Security strategy analysis of SQL database based on WEB

Chapter 1 Overview

1. 1 database security in the network age

1.2 the necessity of studying database security strategy

1.3 Talking about the database security strategy based on Web

1.4 Matters needing attention in the research process

Chapter 2 Introduction of MS SQL Server 2000 Database

2. 1 database object

2. 1. 1 database table

2. 1.2 database relationship

2. 1.3 database view

2. 1.4 database stored procedures

2. 1.5 database extended stored procedure

2. 1.6 database users and roles

2.2 security of ms SQL server 2000 database

2.2. 1 verification method selection

2.2.2 Verification under the network environment

2.2.3 Setting Global Groups

Allow database access

Distribution of power

2.2.6 Simplify safety management

Chapter 3 SQL database stored procedures

3. Two ways of calling stored procedures in1ASP and their comparison.

3. 1. 1 Paging instances using stored procedures

3. 1.2 Paging instance without stored procedure

3.2 using SQL stored procedures to pay special attention to the problem

Chapter 4 Introduction of Sample Web Programs

4. 1 Brief introduction of a university website

4. 1. 1 website function

4. 1.2 website database design

4. 1.3 website code design

4. 1.4 website composition architecture

4.2 ASP connecting MS SQL Server 2000 database

4.2. 1 Establish a connection through ODBC DSN.

4.2.2 Establish a connection through oledb.

4.2.3 Establish the connection through the driver.

4.2.4 Example of ASP connecting to SQL database

Chapter 5 Intrusion Detection

5. 1 invasion demonstration

5.2 Existing vulnerabilities

5.3 Vulnerability analysis

Chapter VI Security Policy

6. 1 Server Operating System Security Policy

6. 1. 1 account security

6. 1.2 Permission Configuration (NTFS)

6. 1.3 password security

6. 1.4 Log management

6. 1.5 virus prevention

6.2 MS SQL Server2000 database security strategy

6.2. 1 security password policy

6.2.2 Security Account Policy

Recording of database logs

6.2.4 Extended stored procedures

6.2.5 protocol encryption

TCP/IP port configuration

6.2.7 IP restriction of network connection.

6.3 Network Program Security Policy

6.3. 1 code anti-SQL injection design

IIS security configuration

Account management

6.3.4 Authority management

Password security (MD5)

Chapter 7 Security of Other Databases

7. Security of1msaccess database

7.2 security of ms SQL server 2005

7.3 ORACLE database 10g security

Chapter VIII Summary

Express gratitude/gratitude

refer to

-

The above is the outline of my undergraduate thesis. Handmade. If there are similarities, it will be a great honor (of course, similarity is impossible).

The paper has written 35,000 words (after deletion). That is an excellent graduation thesis of colleges and universities in our province.