文档详情

保障SQL SERVER 2000中安全的最佳做法外文翻译.doc

发布:2017-09-12约2.85万字共18页下载文档
文本预览下载声明
外文翻译 原文 SQL Server 2000 Security Best Practices Material Source: Global Knowledge Author Brett Tomson, Introduction The Slammer worm, SQL Injection attacks, Denial of Service attacks, and Brute Force attacks.News headlines scream the latest theft of 300,000 credit card numbers from an e-commerce web site by a group of hackers. A disgruntled employee trashes years of proprietary corporate data after learning that he is being laid off. These attacks and many others are examples of the security threats that pervade our interconnected society. System and network administrators are at the forefront of the defense against these attacks. But, with the explosion of e-commerce, database administrators must ensure the security and integrity of their database servers. This article examines best practices that can be employed to secure Microsoft SQL Server 2000 databases. It provides an overview of the security model in SQL Server 2000 and then discusses several best practices that can be employed to secure your SQL Server 2000 database server. What Are Best Practices and Why Should We Use Them? Best practices are techniques, tips, and tricks that have evolved over time through research, planning, and deployment in organizations. The process of yielding best practices typically involves a series of trial-and-error stages implementing a technique or methodology and then evaluating its effectiveness. If the result is positive, the technique is kept, refined, and distributed to other members of the organization. If the result is negative, the practice is thrown out and another technique is tested. This substitution repeats until a positive result is reached. In the end, the organization is left with a group of techniques and methodologies that when employed will increase the productivity and effectiveness of the organization as a whole. Best practices are by no means restricted to the IT world. You will often find best practices injust about every field imaginable, from
显示全部
相似文档