StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Systems Security - Report Example

Cite this document
Summary
This report "Information Systems Security" discusses a database that would include tenants and the building managers. All users will have access to the database. However, this will be limited to the information a user is expected to provide or use…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Information Systems Security
Read Text Preview

Extract of sample "Information Systems Security"

Database Security al Affiliation: Section I: Users Data Access Needs The users for this database would include tenants andthe building managers. All users will have access to the database. However, this will be limited to the information a user is expected to provide or use. This database will entail information pertaining to tenants’ information, including bio data and financial records as pertains their occupancy. Building managers will have administrator privileges, allowing them to edit and/or update all information pertaining to the building they manage. Building Manager Table Name SELECT INSERT UPDATE Constraints Tenant Lease Agreement × × × Only for the buildings they manage Building × × Only for Buildings they manage Manager × × Only for the buildings they manage Tenant × × × Only for the buildings they manage Rent Revenue × × × Only for the buildings they manage Apartment Maintenance × × × Only for the buildings they manage Expense Type × × × Only for the buildings they manage Expenses × × × Only for the buildings they manage Tenant Table Name SELECT INSERT UPDATE Constraints Tenant Lease Agreement × × Only for the buildings their apartment Building Manager Tenant × × × Only for their contacts Rent Revenue Apartment Maintenance × × Only for their Apartment Expense Type Expenses Section II: Security Plan Tenant information is one of the most crucial facets of information for any business within the real estate industry. As such, the company ought to put in place structures that will ensure information security in two main ways, (1) authentication and authorization, and (2) general policies and procedures. The firm’s database containing all information pertaining to tenants and other aspects of the business will be stored in two main servers. These servers will be accessible by all tenants and building managers. Login Accounts Every database user will have a login account that will allow them access to the database. There are two general types of accounts, (1) tenant accounts for tenants, and (2) manager accounts for building managers. Each account will determine the scope of information that the given user is allowed. While manager accounts will have administrator privileges, tenant accounts will have very limited access to the database. Each login account will have a password that will be created by each user upon creation of the account. Firewall A firewall is in essence a baseline control for the securing of any network environment of any enterprise. Routers are usually integrated with a firewall. Examples include software based packet filtration and Network Address Translation. A distinct firewall that is hardware based is recommended. This is due to the disturbing fact that hackers in this time and age employ advanced technology and methodologies that they use to breach networks. A good example of this is APT (Advanced Persistent Threats). These employ advanced phishing techniques and complex algorithms. The threat posed by such security menaces may damage a company’s reputation or compromise the integrity of its confidential information, causing it to lose clientele as banks would in the case where credit card numbers are leaked. Intrusion Detection System The use of a firewall supplemented by an antivirus is not sufficient to ensure information security. An intrusion detection system will be put in place. An intrusion detection system is vital for the security of any corporate network as the system would issue an alert preceding an attack. The alert enables the relevant technician to quickly identify the computer that is compromised, isolate it and initiate an action plan to mitigate and eliminate the threat in question. When an IDS generates alerts, it can send them to a console in the security centre, to a mobile phone, or via e-mail. Discuss the pros and cons of each. IDS alerts hold numerous key benefits. One key advantage of the IDS alerts is the prior notification of an impending breach in the corporate network. This gives the respective network and computer technicians time to isolate the computer and device an elaborate and adequate action plant to counteract, mitigate and eliminate the threat. Furthermore, the delivery of these alerts is ideal in the manner in which the alert is sent to the concern personnel. This is usually through the more proffered SMS. In the case where the alerts are transmitted through email, the relevant employee may not be available or have access to a computer at the time, rendering the information ineffective. Therefore, messages and alerts generated by the IDS have to be transmitted through a secure medium that is also reliable and accessible at any moment in time. Other aspects of the IDS alert system that have to be put into consideration include: SMS alerts have the highest probability of reaching the relevant security administrator. However, alerts transmitted through medium have to be high-probability attacks. Otherwise, the alerts would lose value if all alerts are transmitted through this medium. The manager console screen should not be the primary medium for alerts. This is owing to the fact the manager console screen would not be manned at all time, especially at night, on weekends and holidays. The email medium is not also very reliable and secure. This is because emails are usually not checked on a regular basis and they can only be effective if an email messenger system is employed. Furthermore, emails may be compromised as there are spam mail and malicious codes that may be embedded in the emails. Section III: Preliminary Threat Analysis The biggest threat to the company’s information security is the leakage of information to a user other than those allowed within the database, i.e. tenants and building managers. This is by far one of the most considerable threats as the main purpose of this plan is to ensure information integrity. There is also the threat if a tenant gaining access to an account with admin privilege, allowing them edit, update or delete information that is otherwise sensitive. There is also the present threat of accidental entry and update errors. These can be committed by any given user but can be mitigated by the use of the carefully stored views and procedures. Role Building Managers Threat Description SELECT Could see information not pertaining to the building they manage INSERT Insert errors in tenant and manager UPDATE Update errors in tenant and manager DELETE Role Tenants Threat Description SELECT Could see information not pertaining to their apartment or residence INSERT Insert errors in tenant information UPDATE Update errors in tenant information DELETE Section IV: Disaster Management Plan A firm is trying to decide whether to place its backup centre in the same city or in a distant city. List the pros and cons of each choice. It is usually advisable that a disaster backup site be placed in a different geographical from the original site. The following advantages are associated with having both sites in the same city include: There would be shorter long haul distances between the two sites. This translates to cheaper costs for the dedicated bandwidth required for CDP-type backup. There would be a much shorter distance for IT personnel to travel to get cold or hot backup site functional in shortest amount of time The disadvantages associated with having both sites in the same city include: In the event of a major environmental disaster, both the primary and the backup sites would be affected, possibly even taken out. In the event of such an occurrence, the safety of travel for the personnel is guaranteed due to possibly dangerous environmental conditions. The advantages associated with having the sites in different geographical sites include: The chances that an environmental disaster occurs at both primary and secondary site simultaneously is hopefully very slim. The disadvantages associated with having the sites in different geographical locations include: There is reduced visibility on environments at hot or cold site in the event of a disaster at primary site. This may make switching to backup site take much longer There are much higher costs associated with transferring material (computers and backup tapes), data (CDP) and personnel to backup site. It may be increasingly difficult to the skilled personnel from the primary site to backup location quickly to facilitate cutover. Section V: Data View USE [Master] GO CREATE DATABASE [LEASE] ON PRIMARY (NAME = NLease, FILENAME = N\\FSA\SQLDB\lease.mdf’,   SIZE = 4GB, MAXSIZE = 10GB, FILEGROWTH = 2GB) LOG ON (NAME = NLease_log, FILENAME = N\\FSA\SQLDB\lease_log.ldf’,   SIZE = 2GB, MAXSIZE = 3GB, FILEGROWTH = 10%) GO CREATE TABLE dbo. Tenant Lease Agreement ( TenantLeaseKey CHAR (10), Primary Key, LeaseStartDate DATE, Not Null, LeaseEndDate DATE, Not Null, Deposit DECIMAL (15, 2), RentAmount DECIMAL (15, 2), LateFees DECIMAL (15, 2), ApartmentKey CHAR (15), Foreign Key, TenantKey CHAR (20), Foreign Key, ); CREATE TABLE dbo. Building ( BuildingKey CHAR (10), Primary Key, BuildingName CHAR (30), Not Null BuldingAddress CHAR (30), Not Null ); CREATE TABLE dbo. Manager ( ManagerKey CHAR (10), Primary Key ManagerLastName CHAR (50), Not Null ManagerFirstName CHAR (50), Not Null BuildingKey CHAR (10), Foreign Key ); CREATE TABLE dbo. Tenant ( TenantKey CHAR (20), Primary Key TenantLastName CHAR (50), TenantFirstName CHAR (50), TenantEmail_Address CHAR (30), TenantPhoneNumber NUMERIC (20), ); CREATE TABLE dbo.Rent Revenue ( RentRevenueKey CHAR 10), Primary Key RentAmount DECIMAL (15, 2), RentDueDate DATE, LateFeeAmount DECIMAL (15, 2), TenantLeaseKey CHAR (30), Foreign Key ); CREATE TABLE dbo. Apartment Maintenance ( ApartmentMaintenanceKey CHAR (10), Primary Key RequestDate DATE, MaintenanceType CHAR (30), Resolution CHAR (30), Resolution Date DATE, ApartmentKey CHAR (30), Foreign Key ); CREATE TABLE dbo. Expense Type ( ExpenseTypeKey CHAR (30), Primary Key Repair CHAR (50), Maintenance CHAR (50), Utilities CHAR (50), Apartment Cleaning CHAR (50), Insurance CHAR (50), ); CREATE TABLE dbo. Expenses ( ExpenseCostKey CHAR (30), Primary Key CostAmount DECIMAL (15, 2), ApartmentMaintenanceKey CHAR (30), Foreign Key ExpenseTypeKey CHAR (30), Foreign Key ); References Chavas, J. -P. (2004). Risk analysis in theory and practice. Amsterdam: Elsevier Butterworth-Heinimann. Information Systems Security Association. (1992). Information systems security. Boston: Auerbach Publications. National Institute of Standards and Technology (U.S.). (1994). Information systems security. Washington: The Institute. Peltier, T. R. (2001). Information security risk analysis. Boca Raton: Auerbach. Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Database Secuirty Coursework Example | Topics and Well Written Essays - 1500 words”, n.d.)
Database Secuirty Coursework Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/information-technology/1654381-database-secuirty
(Database Secuirty Coursework Example | Topics and Well Written Essays - 1500 Words)
Database Secuirty Coursework Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1654381-database-secuirty.
“Database Secuirty Coursework Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1654381-database-secuirty.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Systems Security

Cyber Crime and Information Systems Security: The Concept of Phishing

The goal of this paper is to examine the techniques used in cybercrime as well as to provide an overall definition of Information Systems Security.... The users of information systems have readily available information at their fingertips, for example, complete Encyclopedia Britannica in one Compact disc with all sorts of search features is available.... Crimes against information systems is a growing concern amongst the Cybersecurity experts and Federal Law agencies as this has the potential to bring down a system and operation which otherwise would run smoothly....
10 Pages (2500 words) Research Paper

Information Systems Security Assurance Management

The paper “Information Systems Security Assurance Management” presents a case of study of disaster management and recovery by Municipal Solutions, a company that is engaged in providing information systems and solutions to municipalities in the United States.... Information Systems Security Assurance Management Summary:As the title suggests, the paper presents a case of study of disaster management and recovery by Municipal Solutions, a company that is engaged in providing information systems and solutions to municipalities in the United States....
2 Pages (500 words) Article

EISA: Evaluating and Meeting the Security Needs

The Information Systems Security officers guide: Establishing and managing an information protection program.... Fundamentals of Information Systems Security.... Managing Information Systems Security and privacy.... To ensure stability of the department's… Various researches have proven that the employees in the department contribute a whole lot to the security of the department's information asset.... The paper gives an analysis of the information security EISA: Evaluating and Meeting the security Needs Number The security of an organization's information technology infrastructureis highly crucial....
2 Pages (500 words) Research Paper

Information Systems Security and Ethical Issues - Finance Management

The paper "Information Systems Security and Ethical Issues - Finance Management" describes that financial management is the function of the business that is involved in managing the finances of the business in terms of expenditure, revenues and other liabilities such as taxes, managing loans and sources of finance.... Computerized information systems are becoming the De facto way to communicate business information, especially financial information.... As Whitman and Mattord (2011), say, there are however many security issues which have to be used which range from internal threats, external threats from hackers, etc....
6 Pages (1500 words) Assignment

The Role of Information Security Policy

Information Systems Security policies are the central repository that protects the assets of an organization by addressing threats.... This has made many organizations… Therefore, an Information Systems Security strategy ensures effective procedures as well as assists for information security across the whole organization.... The size and nature of firm normally influences Regardless of all these, the essence for a security policy on information systems is unquestionable....
4 Pages (1000 words) Essay

Hacker Target and Response

Information Systems Security policies at that instance may frequently be exploited to help integrate the multiple diverse perspectives of a corporation to accomplish organizational security aims.... It is also important to show the preventive measures and the appropriate responses towards the security threat.... Another area that could be attacked by the ex-employee is the financial security system.... One of the ways is using other employees to obtain information; the other means they could employ is to use their knowledge of security passwords and access the organization's information system....
7 Pages (1750 words) Essay

Department of Health and Human Services IT Security Program

This policy is particularly directed at the employees who are tasked to gather, process and transmit HHS information and infrastructure resources such as the Chief Information Officer (CIO), the Deputy Assistant Secretary for Information Resources management and Senior Information Systems Security Officer.... The author examines a security strategy which has been developed by the Department of Health and Human Services Department of Health and Human Services, for strengthing health care delivery and access by encouraging innovation as well as efficiency and transparency of the programs and processes… Since the administration of President Barack Obama took charge of the government in 2008, one of the objectives that have been aggressively pursued was health care....
4 Pages (1000 words) Research Paper

Biometric Authentication

hellip; A combination of these security measures would be necessary at the DoD to ensure that not only authorized users access the system but also that their activities are authenticated and data transmitted in secure ways.... Whereas this has been happening through security tools such as access cards, passwords, and tokens, these systems have proven to be ineffective as they can be forgotten, duplicated, shared, or stolen (Weicheng Shen, 1999).... If used together with traditional systems, such as password protection and fingerprint technology, the result is a security system that is complex, and yet very efficient and hard to manipulate....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us