StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Safe Guarding Sensitive Database - Assignment Example

Cite this document
Summary
The reporter describes that it is important to safeguard sensitive computer records related to individuals to prevent loss of personally identifiable information, thus preventing substantial harm, embarrassment, inconvenience or unfairness to an individual (Wu & Liu, 2003)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.9% of users find it useful
Safe Guarding Sensitive Database
Read Text Preview

Extract of sample "Safe Guarding Sensitive Database"

Answering QuestionsQuestion 1 a) Data Hiding is the best practice for safe guarding sensitive database data also referred to as security through obscurity. b) It is important to safeguard sensitive computer records related to individuals to prevent loss of personally identifiable information, thus preventing substantial harm, embarrassment, inconvenience or unfairness to an individual (Wu & Liu, 2003).Question 2 a) First check the obvious. If the file is not in the Recycle Bin, click Start, Search and use Windows' click View, Explorer Bar, Search and select All files and folders in the left pane.

For Vista, choose Start, Search, click the down arrow on the right side of Advanced Search, then select Date modified in the Date dropdown menu which is on the left. Here, you then look for any recently created, altered or renamed files. If you find what you are looking for, to be safe, save it in at least two different storage devices. b) - Identity proofing, registration and credential delivery which bind an identity to a token. Depending on the level of assurance necessary for the system, this process is done either remotely or in person.

It includes: Remote authentication mechanisms: This is the combination of authentication protocols credentials and tokens which are used in establishing the subscription of the claimant’s authenticity as a subscriber.Assertion mechanisms: This is used to communicate remote authentication results to other parties. They are issued by verifiers pertaining to claimants as a result of a successful authentication, and they are either signed in a digital way by their issuers or by direct way of obtaining, by presenting parties from a trustworthy party through a protocol with secure authentication.

They would not be the same for a bank versus a school since in a bank, the authentication protocols present a way a claimant can establish the token control to a verifier without compromise but with a school, such high level of security is not required since they don’t run high risk business. They do not hold highly sensitive documents as it is with a bank (Williams & Simoff, 2006).Question 3 a) Age, gender/sex and socio-economic status: In analyzing the audience, I will first determine the primary age group and gender of your audience, audience’s race and/or cultural background, my audience location in terms of their country/state/city, their education level, socio-economic status and religion. b) What I believe I can do as a speaker to respond to the audience’s listening goals is focusing on what they are interested in since it is a common thing to see.

Otherwise one may encounter problems since intelligent people talk about what they’re interested in rather than what the audience is interested in. c) I would tell them why they should listen to stress the relevance of the topic at hand, and then I would not make it neither too easy nor too hard, so that they don’t assume it or be scared of it (Okongo, 2007).Question 4 The type of outline and/or speaking notes I would prefer to use for my speech is detailed preparation outline. This helps in my preparation of my speech.

Here, I will state my specific purpose and focal idea; give a label to the introduction, the body, and finally the conclusion; while designating internal previews, transitions and also internal summaries. I will identify the main points and sub points by a coherent pattern which will be of symbolism and indentation (Okongo, 2007).ReferencesOkongo, A. G. (2007). Audience Analysis in Skilled Communication. Milton Keynes: AuthorHouse.Williams, G. J., & Simoff, S. J. (2006). Data Mining: Theory, Methodology, Techniques, and Applications.

London: Springer.Wu, M., & Liu, B. (2003). Multimedia Data Hiding. London: Springer.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Safe Guarding Sensitive Database Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Safe Guarding Sensitive Database Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1615956-please-answer-the-4-discussion-on-two-pages
(Safe Guarding Sensitive Database Assignment Example | Topics and Well Written Essays - 500 Words)
Safe Guarding Sensitive Database Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1615956-please-answer-the-4-discussion-on-two-pages.
“Safe Guarding Sensitive Database Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1615956-please-answer-the-4-discussion-on-two-pages.
  • Cited: 0 times

CHECK THESE SAMPLES OF Safe Guarding Sensitive Database

The Cloud Database Model

This paper ''the Cloud database Model'' tells that the cloud database model should have specific objectives in line with policies of the organization.... The cloud database model should have specific objectives in line with policies of the organization.... If all these aspects of cloud database management are not ensured then the consequences could be data loss, wrong location data placement or data alteration during transfer process....
10 Pages (2500 words) Research Paper

Data Mining and Behavior of Customers

Data mining Name Professor Course Institution Date QUESTION 1 Benefits of data mining process Predictive analytics to understand the behavior of customers The use of predictive analytics helps in the determination of a predictive score for the elements associated to the organization.... hellip; The major organizational element, in this case, is the customers....
4 Pages (1000 words) Essay

Information Management and Statistics, Component A - Case Study Assessment

The use of a database is an effective way of storing data about a certain aspect at once.... Databases in the bank allows for instant changes in the data thus affecting the whole database and not just changing file by file.... The database is administered by an expert who engineered it; he has become part of the data management team....
12 Pages (3000 words) Essay

How can Social Policy Eradicate Child Poverty

Children are sensitive beings who do not have the power to vote, or form petition authorities to foster programs that could defend their right....  This assignment "How can Social Policy Eradicate Child Poverty?... discusses the experience of childhood poverty connects with the social exclusion affecting the children, not only in their society but also in familial lives....
9 Pages (2250 words) Assignment

Potential Threats to the Database

This research will begin with the statement that a database is a collection of interrelated files.... Presently all the corporations run their business through the database technology.... hellip; This paper presents a detailed analysis of the potential threats to the database as well as ways of ensuring database security.... In this scenario, a threat is some kind of situation that can badly affect the database system and the data inside it....
5 Pages (1250 words) Case Study

Theoretical/Practical Question on CAT Tools

However, with a TM which has a huge database, the functionality and the quality of translation are limitless, but the human aspect is the most relevant factor in the use of the TM… The main benefits that accrue using translation memory tools are numerous and probably outweigh its demerits.... Ideally, a translation memory, or TM, consists of a database comprised of "segments" of literature that have been previously translated (Garcia, 2007, pp.... The database usually stores millions of such segments and usually uses algorithms to identify the best language pairs (units) that suit a written word, phrase or even a sentence....
6 Pages (1500 words) Coursework

How Hacking and Cyber-Attacks Compromise on Sensitive Information

The paper "How Hacking and Cyber-Attacks Compromise on sensitive Information" states that cybercriminals are notorious for breaking into computer networks and illegally obtaining sensitive information.... he article notes that installing the latest antivirus protection and anti-malware programs are a sure-fire way of guarding computers against unauthorized access....
10 Pages (2500 words) Annotated Bibliography

Implementing Secure Linux Database System

Sometimes back, a security analyst was hired by ACME Software Solutions; so as to be capable of safe-guarding their database-server after their security system had experienced a number of thwarting compromises.... Despite a minimal fortune being spent and the salesman giving his assurance, the safe-guarding occurrences, specifically on the database-server continued.... For instance, the security incidences on the database-server comprised the following: the IPTables was run by the server, but only after being permitted by the DAC file; the database server was only capable of running a custom-middleware that had been coded in Ruby; the majority of websites used the database server as a back-end; and the database server was only able to run MySQL on Ubuntu 9....
7 Pages (1750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us