Maurice Tutor

(5)

$15/per page/Negotiable

About Maurice Tutor

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Algebra,Applied Sciences See all
Algebra,Applied Sciences,Biology,Calculus,Chemistry,Economics,English,Essay writing,Geography,Geology,Health & Medical,Physics,Science Hide all
Teaching Since: May 2017
Last Sign in: 407 Weeks Ago, 6 Days Ago
Questions Answered: 66690
Tutorials Posted: 66688

Education

  • MCS,PHD
    Argosy University/ Phoniex University/
    Nov-2005 - Oct-2011

Experience

  • Professor
    Phoniex University
    Oct-2001 - Nov-2016

Category > Computer Science Posted 27 Aug 2017 My Price 15.00

logical continuation of assignment

  1. This final assignment is the logical continuation of assignment #1. In assignment #1, you researched your organization or school to determine its database architecture, and you designed an Assessment and Analysis plan (Phase 1 of the Security Architecture Cycle) for your organization. In particular, you had to:


    • Identify the assets to be protected
    • Define and prioritize the threats against those assets

    In this final assignment, you are asked to (partially) implement Phase 2 of the Security Architecture Cycle (“Design and Modeling”, described on page 25 of the textbook). Armed with the knowledge you acquired during this term, you should be able to write policies and to prototype a security architecture that fit the needs of the business (or school) you selected in assignment #1. In particular, you should address:


    • What security policiesneed to be put into place in order to mitigate the identified threats? Security Policies are addressed on page 27. Some additional guidelines and examples are given below.
    • What firmware/software changes need to take place to minimize vulnerabilities and support policies? Given the database management system used in your selected environment and given the policy requirements, what changes in software version/configuration must be done?
    • What security tools or applications should be added to minimize risk?

    You are asked to include the description of the environment, the identified assets and threats from assignment #1 in the final assignment. Please feel free to make some "guesses" about the described environment. Your final submission should be professional-looking. The expected length is between 6 to15 pages.

    -------------------------------------------------------------------------------------------------


    Guidelines for writing the policy:


    • A security policy describes what it means for an organization to be secure. It is an agreed upon document that executive management uses to communicate its security goals and objectives. Thus, the language should be appropriate for all employees.
    • The goal of such a policy is generally to protect valuable and/or confidential information from unauthorized access, but also to limit legal liability and prevent waste or inappropriate use of organization resources. Phrases such as “must”, “should”, or “will” are used to establish baseline expectations for behavior by employees and to authorize audits and monitoring.
    • A security policy typically includes:
      • Scope (1 paragraph)
      • Goals (1 paragraph)
      • Information classification (1-2 paragraphs)
      • Actual requirements: as an itemized list. Specifically, database policy statements could address:
        • Roles and responsibilities: Roles at the organization level could include application developer, database user, database administrator, database owner, application owner etc. Responsibilities should be designated.
        • Database access types
        • Authentication and authorization – a password policy should be defined or referenced
        • Use of encryption (files, data in transit, backup files), managing encryption keys
        • Backups and recovery (weekend or weekdays, on-line or off-line, incremental or full, etc.)
        • Audits (auditor, frequency of audits, what is audited)
        • Use of multi level security
        • Use virtual private databases
        • Database servers hardening (firewall/intrusion detection system, secure configuration, patch management, vulnerability assessment)
        • Change management (ensure privileged accounts are documented, administered, monitored, and reviewed)
      • Reference to supporting documents (existing procedures and guidelines)
      • Reference to regulatory compliance (if any)
      • Consequences for non-compliance of the security policy (1 – 2 paragraphs)

    The following are sample security policies that could help you develop your database security policy:

    • server security policy (http://www.sans.org/security-resources/policies/server-security/pdf/server-security-policy ) ,
    • Mobile Employee Endpoint Responsibility Policy (http://www.sans.org/security-resources/policies/retired/pdf/mobile-employee-endpoint-responsibility-policy )

Answers

(5)
Status NEW Posted 27 Aug 2017 11:08 PM My Price 15.00

Hel-----------lo -----------Sir-----------/Ma-----------dam-----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------and----------- ac-----------qui-----------sit-----------ion----------- of----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n.P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll

Not Rated(0)