Upload
annis-freeman
View
218
Download
1
Tags:
Embed Size (px)
Citation preview
Procedures for Protecting a Database
Better worlds through database protection
S A F E T Y M ATT E R S
Re m o v i n g t h e a l i e n e l e m e n t
Don’t forget to write
• First line of defense
Better worlds through database protection
H u m a n i n t e r v e n t i o n
f o r t i fi c a t i o n
Imag
e c
ourt
esy
of
Colo
nia
l M
ari
nes
Better worlds through database protection
Statistics suggest that ne·far·i·ous activities involving your database occur…
MOSTLY AT NIGHT...
MOSTLY…
E V E N W H E N I T ’ S R A I N I N G …
S L E E P B E TT E R
FOLLOWING SOME BASIC RULES
Better worlds through database protection
• 1: Check and reset settings using the Auto Exec macro
• 2: Hide the Database window
• 3: Bypass the bypass
• 4: Split the database
Better worlds through database protection
• 5: Avoid Compact On Close
Simple ways to add a few layers of security to a database
• 6: Hide objects — a subtle form of protection
• 7: Use error handling to protect code
• 8: Password-protect the database
• 9: Convert to mde or accde format
• 10: Password-protect the system
Better worlds through database protection
Better worlds through database protection
When all else failslocate and contactthis woman
LT. ELLEN RIPLEY
Don’t panicand lose your headlike thisunfortunatesynthetic life form
P O I N T S T O R E M E M B E R
She maynot save youbut she cancertainly saveyour database
This concludes the presentation