Next Chapter 10, 11, 12 TOOLS/ENVIRONMENT USED
Chapter 10
Tools/Environment Used
Back-End : MS SQL SERVER 2000
Front-End : MS Visual Basic 6.0
Chapter 11
Hardware/Software Specification
The Hardware requirements for this system are tabulated as follows:
The Software requirements for this system are tabulated as follows:
The ability to support a large number of operating systems makes this software unique.
SQL Server edition or component
Enterprise Edition
Operating system requirement
Microsoft Windows NT Server 4.0, Microsoft Windows NT Server Enterprise Edition 4.0, Windows 2000 Server, Windows 2000 Advanced Server, and Windows 2000 Data Center Server.
Chapter 12
Security Mechanism
The system has been designed to stand against damage (physical and logical), errors, and unauthorized access. Password facility has been incorporated into it to access the GUI and database as well. Not only has this, the user name and the password been facilitated to be stored in a remote database in encrypted form. There are user levels defined in the database having individual security levels which can only be accessed and modified by the database administrator.
There is also a facility of changing and recovering forgotten passwords at the user’s discretion. Nonetheless, the database administrator has the authority to alter the password and user level of a user without the prior permission of the user. He is also capable of adding and removing users from the database and can restrict the rights of an existing user.
Audit control is another security measure used which protects the system from external security breaches and internal fraud or embezzlement. System integrity is another security measure taken which concentrates on the functioning of hardware, database and supportive software, physical security, and operating procedures.
Sponsored Links