Levels Tought:
Elementary,Middle School,High School,College,University,PHD
Teaching Since: | Jul 2017 |
Last Sign in: | 210 Weeks Ago, 1 Day Ago |
Questions Answered: | 15833 |
Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
Ok, so now I need part 2 done, soon as possible. Attached is assignment details.
Â
Â
Â
Â
Â
Â
Â
Database Security CSS330-1702B-01
Â
Database Security Architecture Unit 2 Project
May 31, 2007
Â
Â
Table of Contents
Database Security Architecture. 3
Define and differentiate between a Database Management System to a database. 3
Describe the Netowrk Infrastructure needed to put a Database Server in an appropriate location. 4
Describe additional security mechanisms that could be implemented to protect the database server 5
Â
Â
Â
As organizations try to adopt the dynamic Information Systems, security is key when implementing the databases. Without security many organization would fall due to malicious attacks that lead to loss of assets and information. This paper focuses on ensuring data and information security by looking into methods of securing a database.
A database in simple terms is a collection of information stored in an orderly manner for ease of retrieval, update and manipulation. The database holds the records that make information. In a nut shell it is a collection of data.
The database is then managed by software that is referred to as the database management system, (DBMS). A DBMS is therefore a tool that is a computer program or a collection of programs that help in managing the database. It is the DBMS that makes the database usable by enabling data manipulations within the database. DBMS software comprise examples like Oracle, Access, SQL Server. All these are systems that are used to run a database. One needs a DBMS to be able to easily manipulate records in a database.
Therefore, a database is a collection of information that runs on a DBMS. The DBMS makes the database usable.
To protect information, one needs to protect what holds that information. To ensure data security and privacy in any organization then the database server needs to be safe. The Internet is a necessary devil that must be handled with care. It is through the internet that most bugs spread. From the same Internet we get hackers who can steal information or make the database unusable. Therefore, securing the database from the Internet is key. This is possible by not allowing direct access to the database from the internet. Firewalls help in this. Any attempt to access the database must pass through serious authentication checks and then through the firewall. A good firewall will detect and malicious codes and denying them access. Computers should not be directly connected to the database server to avoid security risks. All PCs must pass through the Firewall to access data from the database server.
Â
Â
It is also important not to forget to provide physical security for the database server. The room holds the database server should be burglar-proof. This protects it from those who want to get in to steal data manually or carry away the whole server or may be destroy it.
The use of private networks can also protect the servers from the malice that comes from the Internet. Through VPNs, secure connections can be created between the servers and remote clients.
Authentication is very important. Biometric identification methods and passwords should be used to authenticate those who are using the servers. By knowing who was logged into the server at a particular time helps in auditing possible threats.
Implementing Intrusion detection systems in the servers can help in detecting possible threats to the information stored and help prevent them. He early a threat is detected the better since less harm is caused.
It would be useless to implement a database system without considering security. This would lead to losses and not profits. Database is a very important part of implementing a database system. Without security there would be no need of bringing information together since that would only make it easy for the enemy to destroy you completely. Number one factor in information systems is information security.
Â
Â
User Account Security        Â
TBD
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Database Vulnerabilities     Â
TBD
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Auditing Techniques TBD
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Auditing Policies      Â
TBD
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
References
7 Security Measures to Protect Your Servers | DigitalOcean.(2017). Digitalocean.com. Retrieved 26 May 2017, from https://www.digitalocean.com/community/tutorials/7-security-measures-to-protect-your-servers
Ragel, R. (2017). Difference Between DBMS and Database. Differencebetween.com. Retrieved 26 May 2017, from http://www.differencebetween.com/difference-between-dbms-and-vs-database/
----------- Â ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly