Retrieved from https://studentshare.org/miscellaneous/1575605-it-database-research
https://studentshare.org/miscellaneous/1575605-it-database-research.
ns” (Microsoft Dynamics), and one wants these activities not to create long backlogs which may hinder with the operation of new asynchronous activities. Separating server roles reduces time for new activities to take place. 3. The N organization must secure its database through strong passwords so that it is made sure that no unauthorized person accesses the database and misuses or steals the stored information. The administrator should take care of where that password is stored and must use encryption classes to protect it.
Passwords are a strong obstacle to hackers and harmful operations. 4. Grant, Revoke and Deny are user permissions which are the statements “to give or take away permissions from a user or role” (Chigrik). The GRANT statement assigns permissions to statements and objects; the DENY permission denies access to the security accounts from inheriting permissions; and, the REVOKE statement removes the GRANT or DENY permissions from user roles. 5. When a flaw is observed in the database, a security patch is used to remove it.
Keeping the system patched and up-to-date is the only solution that prevents vulnerabilities. Patch softwares must be regularly updated to receive automatic and critical patch updates. Windows Update website must be visited regularly, and tools like Microsoft Baseline Security Analyzer (MBSA) must be used to scan and identify vulnerabilities. 6. Virus protection has become very crucial to ensure data protection in the database. Virus scanners must be installed in the system (Strebe 141) to protect the database from vulnerable virus attacks.
Just purchasing a CD is not enough. Most companies want the user to subscribe with them to receive regular updates which are necessary to counter new viruses. 7. It is important to maintain regular backups of the back-end database so that the data can be retrieved in case of physical security damage, virus attack, data stealth, and other such harmful activities which result in total
...Download file to see next pages Read More