3-Computer Science-Software-Security-Data

auditing of data

Programs {auditing} can record who changed database data, when, and why, as shown in audit logs.

keychain for data

Users have identification and authentication information, plus information about what user can access {keychain}.

profile of computer user

Users can have permission to execute specific functions {profile, computer}.

static data

Users do not update system data {static data}, such as instrument locations, entered by administrator at system setup or upgrade.

Related Topics in Table of Contents

3-Computer Science-Software-Security

Drawings

Drawings

Contents and Indexes of Topics, Names, and Works

Outline of Knowledge Database Home Page

Contents

Glossary

Topic Index

Name Index

Works Index

Searching

Search Form

Database Information, Disclaimer, Privacy Statement, and Rights

Description of Outline of Knowledge Database

Notation

Disclaimer

Copyright Not Claimed

Privacy Statement

References and Bibliography

Consciousness Bibliography

Technical Information

Date Modified: 2022.0225