The Security Concept

For the purpose of highest data security a multiple-stage safety concept was implemented in RSS-D, based directly on database-security (OS-security, resp.).
It prevents effectively unauthorized persons from gaining access to data not destined for them by hacking passwords, which were stored in the program-code itself, the windows
®-registry or in other files.
Even disassembling or recording RAM-contents leaves hackers no chance. The two passwords have to be entered with every login to the RSS-D-system explicitly.

The security concept contains the following levels:

  • client level
  • roll level
  • user level

The hierarchically highest layer is the client level. A client in RSS-D is defined by access rights to specific processes, which is done technically on database-security-level by implementation of views. Client-access-rights are defined on roll-level. Client-administration can be done over the provided RSS-D-application, which is reserved to super-administrators.

The roll-level is equal to the database-user-level inhering explicit access rights to database-objects. The administration of rolls (and rights) can be done semi-automatically via an RSS-D-application, reserved for administrators of the respective client. Acess is gained through a password, that equals the corresponding database-user-password. Rights can be granted only to processes, that were assigned to the client by the super-administration.

The user level is safety-related irrelevant. However, on this level the respective user can save preferred settings or definitions for later reusing. The user level is in that way password-protected, but does not contain really sensitive data. The user can freely choose his password and change it at any time. The main advantage of this level is, that many users can be defined associated to one roll. F. e. you may grant many users access to the statistics-visualization-application STA-DEF (and only to this) by defining just a single roll.

RSS-D-security-concept

© Copyright 2006 SYSJM. All rights reserved.

security
sets
statistics