COUNTER MEASURES COMP BASED:
1: Authorization: Granting of rights, which enable a sub to have access to a sys …
2: Views(sub schema): define before…
3: Backing Up: Copies of DB onto offline storage media…
4: Journaling: Keeping a journal(log) of all changes made to DB to enable recovery in case of failure…
5: Check Pointing: Ensure that data in main memory is written out to disk…
6: Integrity:
7: Encryption: Encoding of data by a SP algo…
COUNTER MEASURES NON COMP BASED:
1: Security Policy: Assign responsibility to people…
2: Personnel Controls: Monitoring Employees, Staff Training, Separation of Duties.
3: Secure Positioning of Equipments:
4: Secure Data & SW:
5: Escrow Agreement:
6: Maintainence Agreement:
7: Physical Access Controls:
8: Building Controls:
9: Emergency Arrangements