Next Chapter 10, 11, 12 TOOLS/ENVIRONMENT USED

Chapter 10

Tools/Environment Used

Back-End : MS SQL SERVER 2000

Front-End : MS Visual Basic 6.0

Chapter 11

Hardware/Software Specification

The Hardware requirements for this system are tabulated as follows:

The Software requirements for this system are tabulated as follows:

The ability to support a large number of operating systems makes this software unique.

SQL Server edition or component

Enterprise Edition

Operating system requirement

Microsoft Windows NT Server 4.0, Microsoft Windows NT Server Enterprise Edition 4.0, Windows 2000 Server, Windows 2000 Advanced Server, and Windows 2000 Data Center Server.

Chapter 12

Security Mechanism

The system has been designed to stand against damage (physical and logical), errors, and unauthorized access. Password facility has been incorporated into it to access the GUI and database as well. Not only has this, the user name and the password been facilitated to be stored in a remote database in encrypted form. There are user levels defined in the database having individual security levels which can only be accessed and modified by the database administrator.

There is also a facility of changing and recovering forgotten passwords at the user’s discretion. Nonetheless, the database administrator has the authority to alter the password and user level of a user without the prior permission of the user. He is also capable of adding and removing users from the database and can restrict the rights of an existing user.

Audit control is another security measure used which protects the system from external security breaches and internal fraud or embezzlement. System integrity is another security measure taken which concentrates on the functioning of hardware, database and supportive software, physical security, and operating procedures.

Sponsored Links