Nobody downloaded yet

Database Secuirty - Coursework Example

Comments (0) Cite this document
Summary
All users will have access to the database. However, this will be limited to the information a user is expected to provide or use. This database will entail information pertaining to tenants’…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.5% of users find it useful
Database Secuirty
Read TextPreview

Extract of sample "Database Secuirty"

Download file to see previous pages As such, the company ought to put in place structures that will ensure information security in two main ways, (1) authentication and authorization, and (2) general policies and procedures.
The firm’s database containing all information pertaining to tenants and other aspects of the business will be stored in two main servers. These servers will be accessible by all tenants and building managers.
Every database user will have a login account that will allow them access to the database. There are two general types of accounts, (1) tenant accounts for tenants, and (2) manager accounts for building managers. Each account will determine the scope of information that the given user is allowed. While manager accounts will have administrator privileges, tenant accounts will have very limited access to the database. Each login account will have a password that will be created by each user upon creation of the account.
A firewall is in essence a baseline control for the securing of any network environment of any enterprise. Routers are usually integrated with a firewall. Examples include software based packet filtration and Network Address Translation. A distinct firewall that is hardware based is recommended. This is due to the disturbing fact that hackers in this time and age employ advanced technology and methodologies that they use to breach networks. A good example of this is APT (Advanced Persistent Threats). These employ advanced phishing techniques and complex algorithms. The threat posed by such security menaces may damage a company’s reputation or compromise the integrity of its confidential information, causing it to lose clientele as banks would in the case where credit card numbers are leaked.
The use of a firewall supplemented by an antivirus is not sufficient to ensure information security. An intrusion detection system will be put in place. An intrusion detection system is vital for the ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Database Secuirty Coursework Example | Topics and Well Written Essays - 1500 words”, n.d.)
Database Secuirty Coursework Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/information-technology/1654381-database-secuirty
(Database Secuirty Coursework Example | Topics and Well Written Essays - 1500 Words)
Database Secuirty Coursework Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1654381-database-secuirty.
“Database Secuirty Coursework Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1654381-database-secuirty.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Database Secuirty

Database

...?Task a) and b) The ER-Diagram consists of five main entities, ly VISIT, BOOKING, OWNER, DOG, and INVOICE. The relationships can be explained in detail considering their cardinalities, participations and constraints according to the given scenario. CLASS/VISIT and BOOKING A CLASS/VISIT can have several BOOKINGs and a one BOOKING have a single corresponding CLASS/VISIT. Hence a one to many relationship exits between these entities (Marked with 1 and M near the respective entity). A CLASS/VISIT may or may not have booking at a time and it is considered a BOOKING is optional for a CLASS/VISIT and CLASS/VISIT is mandatory for a booking (marked with a circle on BOOKING as the optional side). A class can either have no bookings... a) and b) The...
4 Pages(1000 words)Assignment

Database

..., organizations need to formulate information security strategies (ISS). In addition, customers have to be capable to recognize an organization’s place in scenario of defending their data and information. Consequently, privacy policy is considered as a tool to express organizational policies to the customers (Pacocha, 2002) and (Curphey & Araujo, 2006). The data warehouse is large size data storage accessed from numerous sources (legacy and operational) databases. Additionally, the data-warehouse is built but combining diverse data sources or changing them into a new structure. However, this process involves a lot of activities such as cleaning, reading, storing and aggregating the data in the warehouse representation. In...
8 Pages(2000 words)Essay

Database Management

...effective information. And this is possible only for a well modeled data. The tutorial presents real life scenarios that a company might face from the time of its initialization to the time when it has let go of certain high salary employees in situations of crises e.g. limited company finances. The tutorial teaches how big organizational level decisions can be reached upon by executing a simple query on the database and extracting the exact subset of information relevant to a particular decision e.g. generating a list of employees with a particular range of salaries. This example merely gives an introduction of how statistical analysis can be conducted on large scale databases. Having relevant...
2 Pages(500 words)Research Paper

Database

...? Happy Homes Database System Database security The security of a database system should be up to The data held by a database is ofgreat importance and loss or damage to that data could result into great consequences to the organization. Happy Homes Ltd has a database for the storage, access, and management of information required for its normal operations. To enhance the security of the database, several key concepts have to be looked at and properly set. This enhances maximum operation and security of the database. First, the issue of access control should take center stage while discussing the security concepts. This...
5 Pages(1250 words)Coursework

Database

...? Creating an Extended Entity Relationship Model (EERM) Creating an Extended Entity Relationship Model (EERM) We use a classical four-layered approach to inductive specification of database structures. The first layer is the data environment, called the basic data type scheme, which is defined by the system or is the assumed set of available basic data. The second layer is the schema of a given database. The third layer is the database itself representing a state of the application's data often called micro-data. The fourth layer consists of the macro-data that are generated from the micro-data by application of view queries to the micro-data (DIETRICH, 2011). The second layer is diversely treated by database modeling languages... for...
6 Pages(1500 words)Assignment

Database

...are held on record. Products are identified by their name and records of the product type and a description of the product are kept. i.) Design an E-R diagram for the above database ii.) Derive a corresponding relational scheme from your E-R diagram. Table Assets: assetID (primary) productID (primary) location LeaseRenewalDate Table Assets Inspection: inspectionID (primary) inspectorID (primary) assetID (primary) maintenanceDate maintenanceAction Table Inspectors: inspectorID (primary) name position Table Products: productID (primary) name type description Question 2: A garden plant supplier keeps data about their customers, orders and the plants they sell in a relational database with the...
4 Pages(1000 words)Assignment

Database Management. MSSQL Server Database

...Running head: Database Management Database Management Introduction Navathe (2003) defines database as a collection of programs that enables users to create and maintain a database. It can also be defined as general purpose software for defining, creating, fetching and sharing databases among various users. The flavors of the databases used for e-commerce websites follow a different pattern set for storing data and offer various storage patterns and features to enable it to be distinguished from the competitor. In this case the university requirements deal with a variety of services which requires their data to be stored in a...
3 Pages(750 words)Essay

Database

...Databases An electronic database is an organized collection of data in a digital form, to achieve a properly working database. A specific user requirement needs to be well elicited before the design and development takes place. These requirements are in two categories; functional and non functional. The functional ones are. First, it should allow users to create new trainers and topics; secondly, it should allow creation deletion of users. It should also allow only authorized users to make changes in the data stored example the trainers should not have the privilege of making changes on schedules and topics, it should allow easy production of standardized reports. The developer should...
1 Pages(250 words)Essay

Database

...Bioterrorism Response System Introduction To respond to bioterrorism attacks, health officials must play their part in helping detect, communicate and manage such events. Technological advance enables health officials, including nurses to respond to an attack. To create a database for use in bioterrorism response, certain factors have to be considered; purpose of the system, being detection, diagnosis, management, and communication, clinical evaluation of the system and system security (Gill, 2008). Information from the system should help officials make accurate decisions. For the system to function accordingly, it has to have a measure of accuracy. Sensitivity is required in order to detect the smallest hints of attack....
1 Pages(250 words)Essay

Database design and SQL Light database creation

...Database Schema Sarita Gogan Grand Canyon HIM-650 Health Care Data Management February 20, Database Schema for a health care clinic The entities and relationships of health care clinic are indicated below together with their relationship; Table 1 : Entities, Attributes and their Relationships Entity Attributes Relationship Deleted_Date Health Care Center Name, address, location Attends to patients Patients Patient number, first name, last name, phone, next of kin, address Patients report in the clinic Appointments Patient number, date, time , appointment number Patients are allocated appointments Prescriptions Patient number ,medicine ,description ,treatment ID Pharmacists give medicine to the patients after being attended... to the...
3 Pages(750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Database Secuirty for FREE!

Contact Us