StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

IT Database - Research Paper Example

Cite this document
Summary
Physical security involves measures taken to ensure security of workforce, system devices and equipment, resources, documents and sensitive information stored on physical media (like hardware programs and networks) from damaging proceedings like unauthorized access, fire,…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.2% of users find it useful
IT Database Research
Read Text Preview

Extract of sample "IT Database"

Download file to see previous pages

ns” (Microsoft Dynamics), and one wants these activities not to create long backlogs which may hinder with the operation of new asynchronous activities. Separating server roles reduces time for new activities to take place. 3. The N organization must secure its database through strong passwords so that it is made sure that no unauthorized person accesses the database and misuses or steals the stored information. The administrator should take care of where that password is stored and must use encryption classes to protect it.

Passwords are a strong obstacle to hackers and harmful operations. 4. Grant, Revoke and Deny are user permissions which are the statements “to give or take away permissions from a user or role” (Chigrik). The GRANT statement assigns permissions to statements and objects; the DENY permission denies access to the security accounts from inheriting permissions; and, the REVOKE statement removes the GRANT or DENY permissions from user roles. 5. When a flaw is observed in the database, a security patch is used to remove it.

Keeping the system patched and up-to-date is the only solution that prevents vulnerabilities. Patch softwares must be regularly updated to receive automatic and critical patch updates. Windows Update website must be visited regularly, and tools like Microsoft Baseline Security Analyzer (MBSA) must be used to scan and identify vulnerabilities. 6. Virus protection has become very crucial to ensure data protection in the database. Virus scanners must be installed in the system (Strebe 141) to protect the database from vulnerable virus attacks.

Just purchasing a CD is not enough. Most companies want the user to subscribe with them to receive regular updates which are necessary to counter new viruses. 7. It is important to maintain regular backups of the back-end database so that the data can be retrieved in case of physical security damage, virus attack, data stealth, and other such harmful activities which result in total

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“IT Database Research Paper Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1575605-it-database-research
(IT Database Research Paper Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/miscellaneous/1575605-it-database-research.
“IT Database Research Paper Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/miscellaneous/1575605-it-database-research.
  • Cited: 0 times

CHECK THESE SAMPLES OF IT Database Research

The Cloud Database Model

Introduction and Background of the research The cloud computing technology has been receiving significant attention in the market lately.... This paper ''the Cloud database Model'' tells that the cloud database model should have specific objectives in line with policies of the organization.... The cloud database model should have specific objectives in line with policies of the organization.... If all these aspects of cloud database management are not ensured then the consequences could be data loss, wrong location data placement or data alteration during transfer process....
10 Pages (2500 words) Research Paper

Use of Boolean Tools in Searching a Database

It has been apparently observed that a particular research database related to any nursing field such as congenital cardiac disease is normally suited to conduct in-depth investigations of functional outcomes (Hickey, McCrindle, Caldarone, Williams & Blackstone, 2008).... Describe a database A database is fundamentally described as the collection of valuable information that is organized in such a way so that a particular computer based program can quickly select desired portions of data....
12 Pages (3000 words) Research Paper

Three-Level Database Architecture

The basic purpose of this research is to discuss the basic scenario of three level architecture and how it forms the basis of database management systems.... The research has shown that the modern database structure is based on three level architecture.... At present, modern DBMSs exemplify decades of educational and industrial research as well as influential business software development.... In order to make the best use of this data, they make use of different database management systems (DBMS)....
12 Pages (3000 words) Research Paper

Using a Star Database Schema

The main aim of a marketing department adopting the database Schema Fig A Star schema diagram for an online company Data warehouses form the bases for solid business intelligence solutions.... The main aim of a marketing department adopting the use of a dimensional model is to help decision makers in making strategic decisions without the need of help and support from database experts thereby avoiding extra cost.... It is the sole reason as to why data warehouse have huge amount of data compared to a transactional database....
2 Pages (500 words) Research Paper

High-Quality Distributed Database Systems

In the current speedy and constantly advancing technological world, the need to have high quality distributed database systems is one of the most crucial subjects of concern.... To be precise, having a well-organized database system is always an essential aspect particularly in… Essentially, the chief purpose of using distributed databases is to guarantee data confidentiality, integrity and availability.... This is specifically on issues based on controlling concurrency of organization data and most importantly, the security of data and transactions handles by distributed database systems....
4 Pages (1000 words) Research Paper

The Privacy and Security Related Issues in Databases

This research paper presents a detailed analysis of the privacy and security related issues in databases.... This research will also outline the problems with the database privacy and security.... Issues and threats to data security may be straight threats to the database.... For instance, the persons who have the illegal right of entry to a database may then peruse, modify, or even steal the data to which they have gained right of entry....
5 Pages (1250 words) Research Paper

Database Design Conflicts

This research will analyze three types of goals which can be conflicting to one another and impossible for all companies to solve all three.... The basic aim of this paper “database Design Conflicts” is to assess these conflicts and issues and afterward suggest several mitigation policies for such issues.... An accurately designed database offers the users means of access to the latest, correct data and information.... For the reason that an accurate design is necessary for attaining an organization's objectives in functioning with a database, spending the time necessary to proficiently discover the standards of high-quality design seems sensible....
9 Pages (2250 words) Research Paper

Database Security - Threats and Challenges

This paper is about database securities layers such as database administration, system administration, security office, developers and employees, about the problem of the provenance of data, ownership and IPR.... nbsp;database information is vulnerable to many different attacks as will be seen in the paper....   database information is vulnerable to many different attacks as will be seen in the paper.... This document focuses on database-specific protections....
15 Pages (3750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us