CHAPTER 52

APPLICATION CONTROLS

Myles Walsh

52.1 PROTECTION IN APPLICATION DEVELOPMENT

52.2 PROTECTING ONLINE FILES

52.2.1 Types of Data Corruption

52.2.2 Database Management Subsystems

52.2.3 Lock on Update

52.2.4 Two-Phase Commit

52.2.5 Backup Files and System Logs

52.2.6 Recovery and Restart

52.2.7 Backout

52.2.8 Roll-Forward Recovery

52.2.9 Distributed Databases

52.3 PROTECTING BATCH FILES

52.3.1 Backup File Creation

52.3.2 Audit Controls

52.4 ENSURING THAT INFORMATION IN THE SYSTEM IS VALID

52.4.1 Validation Controls

52.4.2 Diagnostic Utilities

52.5 CONCLUDING REMARKS

52.6 FURTHER READING

52.7 NOTE

52.1 PROTECTION IN APPLICATION DEVELOPMENT.

In computer installations where systems development takes place, there are technologies that tend to enhance security. These technologies, together with mandatory organizational procedures and standards, force analysts and programmers to adhere to guidelines when they are developing in-house applications or systems to be marketed. This chapter reviews some of the methods programmers use to prevent and identify problems involving data corruption or unavailability.

One of the underpinnings of modern programming is the technology known as the database management system (DBMS). Many applications are developed using this technology. A contemporary RDBMS supports relational databases. Relational databases themselves are based on an underlying technology developed in the 1960s and implemented through the remainder of the twentieth century. It ...

Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.