Thursday, May 14, 2020

Database Security Plan Essay - 8572 Words

CSS330-1404B-01: Database Security Phase 5 IP: Auditing Policies Database Security Project Plan Reginald â€Å"Reggie† Lee Colorado Technical University Online Professor Anita Arceneaux December 22, 2014 Figure 1: (Microsoft.com, 2014) Table of Contents Database Security Architecture 3 Differences between a database and a DBMS 3 Types of database designs 4 Network Infrastructure for Database Security 5 Common Security Threats for Database Servers: 6 Additional Security Mechanisms for Protecting Database Server 9 User Account Security 11 1. New Schema for HR Database 11 2. Corporate Directory amp; Manager Information Views: 12 3. Created Users: 14 4. Created Roles: 15 5. Implemented the Following Access†¦show more content†¦A DBMS is a software program that is intended to manage and query multiple databases. A single database is comprised of tables of relational data, whereas a DBMS can manage relational data that crosses more than one database, and it serves as a manager of the interfaces between the numerous databases, allowing relationships to between databases to be formed. Database managers enhance the classic search feature in most systems to be that much more powerful and vigorous (Onh, 2009). The DBMS ensures that the databases and data stored within it maintains its integrity or in other words, it makes certain the data remains accessible and is reliably structured as anticipated and only those with the appropriate access privileges are allowed to access the data. Some examples of classic DBMSs are relational database management system (RDBMS), the Structured Query Language (SQL) and newer kind of DBMS is the object-oriented database management system (ODBMS) (Rouse, 2014). A database management system is normally an integral part of a database system. Microsoft Access is an example of a popular DMBS designed with the small business user in mind. Microsofts SQL Server on the other hand is an example of a DBMS that has the ability to serve database requests from multiple clients or users. One of the first DBMSs was IBMs Information Management System (IMS). As IBM proved, a DBMS might be utilized by or collectivelyShow MoreRelatedDesign Of Audit Trails And Data Quality Monitoring Programs1624 Words   |  7 Pagesactivities of the system and the application that are done by the system users. Importantly, audit trails are highly used in the process of detecting any form of security violations in the system, performance issues, and any flaws in the applications. Some of the key elements of audit trails include original source documents, transaction history database, and safe storage capabilities. For purposes of making sure that the healthcare data is safe , there are a number of policies that have been developed toRead MoreData Integrity And Availability Techniques1743 Words   |  7 PagesAbstract For many computing systems, database technologies are an essential component. They permit data to be reserved and shared electronically and the quantity of data retained in these systems continually develops at an exponential rate. As organizations upsurge their dependence on, possibly distributed, systems of information for daily business, they develop the vulnerability to security breaches even as they get efficiency and productivity advantages. However, numerous techniques like encryptionRead MoreProcurement Management Pl Acquisition Administration Arrangement Points Of Interest1730 Words   |  7 PagesPROCUREMENT MANAGEMENT PLAN The acquisition administration arrangement points of interest how the obtainment procedure will be overseen. It incorporates the accompanying data: The sorts of agreements you plan to utilize and any measurements that will be utilized to quantify the temporary workers execution The arranged conveyance dates for the work or items you are contracting The organization s standard archives you will utilize The quantity of sellers or temporary workers included and howRead MoreDatabase Backup And Recovery Case Study1148 Words   |  5 PagesDatabase Backup and Recovery All data should be backed up for security and redundancy purposes. There will be plenty of money, time and resources contributing to the success of this and there should be a recovery plan and all the data should be backed up in case something terribly goes wrong. It’s highly recommended that Flix2You has a server responsible for storing backup of the Flix2You database and it should have its own onsite- server farm. Flix2You should have its own on-site server farm,Read MoreSecurity Requirements Possible Risks1342 Words   |  6 PagesSecurity Requirements and Possible Risks: Benefits Elections System Angela Nelson CMGT/442 February, 25, 2013 James Summerlin Security Requirements and Possible Risks: Benefits Elections System Huffman Trucking, an established trucking company since 1936, has recently requested the implementation of a new Benefits Elections System to assist management in tracking and reporting the benefits of both union and non-union employees. A database system will be utilized to store critical data suchRead MoreDatabase Security Requirements : Computer Systems Controlled Access Requirements Essay1599 Words   |  7 Pages4. DATABASE SECURITY REQUIREMENTS 4.1. ORACLE SECURITY Just like the computer systems controlled access requirements, authentication on the Oracle level is also required were a user must enter a distinct ID and password. According to Mehta (2004), â€Å"user authentication at the Oracle level can be configured through creating custom profile(s) within the dba_profiles table. A profile within Oracle is a set of controls that can be applied to users. Different profiles can be created for different classesRead MoreProject Proposal : Nike Inc.1354 Words   |  6 PagesProject Deliverable 1: Project Plan Inception Nike, Inc. is a corporation that specializes in the design, development, manufacturing, marketing, and sales of footwear. Nike, Inc. was founded by Bill Bowerman and Phil Knight. The current Chief Executive Officer (CEO) is Mark Parker. The company headquarters is in Beaverton, Oregon. The company headquarters will be expanding soon and will contain two additional floors. Currently, there are twenty employees and four out of the twenty employees handleRead MoreMedical Record Company Network Security Plan1142 Words   |  5 PagesMedical Record Company Network Security Plan For the purpose of securing and implementing a data security plan for a medical record company a lot of prep and thought needs to take place. While developing the plan I considered that it’s not just our company’s data at risk, but also the data of any of our employees and patients, including social security numbers and medical records. I also considered different kinds of security threats, security threats are always evolving so we need to keep on topRead MoreInformation Systems For The Isms Scope1542 Words   |  7 PagesRAS, user workstations, VPN and modem devices, the switches, firewall, and router. The SHGTS information system. The SHGTS is a database that is housed on the Windows application JINX server. The SGTS is a Microsoft Access database that runs on the Windows JINX server. It is used to track delivery of grant funds, grant users input their grant evaluations in the database, and weekly status reports are generated for an executive officer. This system should be included in the ISMS as the SHGTS is theRead MoreData Breach Research Papaer1455 Words   |  6 Pagesstored in databases, a system of hard drives that stores information electronically normally accessible remotely. With this comes a rise in hackers and correspondingly a rise in security breaches, where hackers have access to sensitive information. Vulnerabilities are the root of all hacks. For businesses, they result in a decline in reliability. If an individual or a group wants to breach information, they will almost always find a way. With the increasing need for information databases, businesses

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.