StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

DBMS Support and Security - Research Paper Example

Cite this document
Summary
This value refers to what strategic and planning information that the data can be used for. Database security has been overlooked in…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92% of users find it useful
DBMS Support and Security
Read Text Preview

Extract of sample "DBMS Support and Security"

Download file to see previous pages

ought to adopt security strategies, for instance, tagging data with a level of confidentiality to make sure only those permitted have access to such data (Connolly and Begg 2009). Security strategies are designed as the overall plans to mitigate risk. As mentioned earlier, most organizations have security strategies, but miss out on database security or do not adequately address the issue. A comprehensive security strategy must lessen the overall possibility of loss or harm to an organization’s data.

Furthermore, the strategy must focus on the business data concerns from a statutory, contractual and legal perspective. There exist multiple regulatory standards and requirements that have imposed on the organization to address information security risks. Contracts are making it necessary to organizations to consider security of their data at all levels. Proactive database security management and planning can save organizations significant amounts of money and reduce the overall exposure to risk.

Striking a balance between the organizational objectives and security requirements is a task that squarely falls on the IT department. They are charged with developing the ICT policy for companies in consultation with management, operational support and other stakeholders. The policies aim to increase the benefits of implementing IT in business. A comprehensive support and security strategy should touch on the following areas. First, it should have a clear definition of organizational control objectives and have controls to meet those objectives.

The organizational control objectives are the processes of evaluating, assigning and regulating resources on a continuous basis to meet organization’s goals. It should then have feasible approaches to meet the objectives with metrics and/or benchmark standards to manage the controls. It is also necessary to have a clear implementation of the controls and have testing and maintenance tasks while going forward. The motivation

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“DBMS Support and Security Research Paper Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1583285-dbms-support-and-security
(DBMS Support and Security Research Paper Example | Topics and Well Written Essays - 1250 Words)
https://studentshare.org/miscellaneous/1583285-dbms-support-and-security.
“DBMS Support and Security Research Paper Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/miscellaneous/1583285-dbms-support-and-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF DBMS Support and Security

Details of the Relation between XML and RDBMS

Also on the minus side, it lacks many of the things found in real databases: efficient storage, indexes, security, transactions, and data integrity, multi-user access, triggers, queries across multiple documents like RDBMS.... This paper makes an insight into the minute details of the relation between XML and RDBMS to understand their nature of complementary and controversy....
12 Pages (3000 words) Term Paper

The Relational Database Lifecycle

TestingOnce the data have been loaded into the database, the DBA tests and fine-tunes the database for performance, integrity, concurrent access, and security constraints.... During the implementation and loading phase, the security, performance, integrity, backup and recovery, standards, and control issues must also be addressed.... So, in addition to examining the current system's operation within the company, the designer must determine how and why the current system fails and gather information and other requirements for the new system. The second phase focuses on the design of the database model that will support company operations and objectives....
4 Pages (1000 words) Essay

Database Design & Development

It is equipped with reliable reporting and security mechanisms.... Enterprise system can be defined as application software package that integrates the data in the organization to support processes, information access and reporting etc.... SQL Server provides support for many data types like Integer, Float, and Decimal etc.... It is a dbms that manages… RDBMS is based on the concept of relational system, referential integrity and normalization (Chaterjee 2005)....
4 Pages (1000 words) Essay

Three-Level Database Architecture

In the past, DBMSs were considered amongst the initial multi-user server systems to be built, and thus they provided excellent support for the new developments in the form of latest systems design methods for consistency and scalability which are widely used in a number of other areas.... In order to make the best use of this data, they make use of different database management systems (dbms)....
12 Pages (3000 words) Research Paper

Three Level Architecture

hellip; According to the essay, the lessons of dbms structure design are not as generally recognized as they should be.... At the external level the dbms outlines every user by means of a shared or particular view or representation of the data.... he external level or view of dbms is basically associated....
10 Pages (2500 words) Essay

The Security Issues that are Faced by a Particular Organization

The paper 'The security Issues that are Faced by a Particular Organization' presents networking which is an important aspect for any organization.... The company has no security policy in regards to their network.... It is most likely that the company has experienced hacking because proper security measures have not been put in place.... This means that in the event of hacking by an unauthorized party into the dbms of the company, the hacker can be able to steal the password of the staff and gain access into the system, where he/she can be able to view and maybe tamper with the important information of the company....
8 Pages (2000 words) Case Study

Database Security: A Comprehensive Approach

According to research findings of the paper “Database security:  A Comprehensive Approach”, despite the apparent advances in database security, new challenges are emerging every day.... These concerns ensure that database security remains a core information issue and business concern.... hellip; Database research has shifted significantly to the field of database security for the last few decades.... Due to rapid changes and evolution in information technology, database management has been transformed into a dynamic process that is ever-changing to adapt to security changes in and around itself....
15 Pages (3750 words) Coursework

Perfect Property Information Management System

That includes an HTML editor program for writing the hypertext documents that constitute the web portal, its styling cascaded style sheet codes, a Database Management System (dbms), a PHP coding environment otherwise referred to as IDE, and a domain name to identify the portal not forgetting an Internet Service Provider (ISP) for online hosting....
6 Pages (1500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us