Chapter 39 – |
Application Controls |
Myles Walsh
Chapter Contents:
|
39.1 |
|
Protection in Development
|
|
39.2 |
|
Protecting Online Files
|
|
39.2.1 |
|
Types of Data Corruption
|
|
39.2.2 |
|
Database Management Subsystem
|
|
39.2.2.1 |
|
Referential Integrity
|
|
39.2.2.2 |
|
Uniqueness Constraints
|
|
39.2.3 |
|
Lock on Update
|
|
39.2.3.1 |
|
Unconditional Versus Conditional Locking
|
|
39.2.3.2 |
|
Deadlocks
|
|
39.2.4 |
|
Two-Phase Commit
|
|
39.2.5 |
|
Backup Files and System Logs
|
|
39.2.6 |
|
Recovery and Restart
|
|
39.2.7 |
|
Backout
|
|
39.2.8 |
|
Roll-Forward Recovery
|
|
39.2.9 |
|
Distributed Databases
|
|
39.3 |
|
Protecting Batch Files
|
|
39.3.1 |
|
Backup File Creation
|
|
39.3.2 |
|
Audit Controls
|
|
39.4 |
|
Assuring that Information in the System is Valid
|
|
39.4.1 |
|
Validation Controls
|
|
39.4.1.1 |
|
Methods for Identifying Input Errors and Unauthorized Modifications
|
|
39.4.1.2 |
|
Range Checks
|
|
39.4.1.3 |
|
Validity Checks Using Tables
|
|
39.4.2 |
|
Diagnostic Utilities
|
|
39.5 |
|
Conclusion
|
|
39.6 |
|
For Further Reading
|
|
|
|