Reference no: EM131092855
Applied research project report submission.
TOPIC: DATABASE SECURITY AND HOW IT SHOULD BE APPLIED IN AMAZON OPERATING SYSTEM ENVIRONMENT.
Part 1: Project Identification and Business Environment
Address the following topics as they apply to your policy:
- Establish authorities and responsibilities for database security management.
- Develop operational and incident management procedures when security breaches are discovered.
- Define personnel and procedures for daily administration and maintenance of security policies.
Part 2: Architecture and Operating System Considerations
Address the following topics as they apply to your policy:
- Define the architecture for your system. Does it use client server, web, or application servers? Given the architecture, elaborate on what methods will be used in your database to support this architecture. Consider the following elements in the formulation of your policy:
- Integration of DBMS security with client applications and operating systems
- Integration of DBMS security with network operations
- Integration of DBMS security with server operating systems
- Integration of DBMS security with web servers and application servers
- Define requirements as they relate to database security. This includes, but is not limited to: connection pooling, proxies, application roles, file permissions, privileged accounts, password requirements, and other methods appropriate to your selection.
Part 3: User Accounts and Password Administration
Address the following topics as they apply to your policy:
- User administration
- Password policies
- Profile definitions and assignments. What is the criterion for assignment of a profile to an account?
Part 4: Privileges and Roles
Address the following topics as they apply to your policy.
- Security model selection
- Roles, including privileged roles assignment and administration and role policies
- System privileges
- Object privileges
Part 5: Database Security Operations
Address the following topics as they apply to your policy
- Requirements and methodology for database logging
- Requirements and methodology for activity auditing
Part 6: Data Isolation Policies
Address the following topics as they apply to your policy:
- Requirements for data isolation
- Database views
- Database triggers
- Database stored procedures
Part 7: Physical Environment for Secured Databases
Address the following topics as they apply to your policy:
- Use of physical security and control mechanisms systems
- Database backup and restore practices relating to security
Part 8: Conclusion, Summary, and References
- Develop a summary and conclusion for your paper
- Cite your references
Determine the specified properties
: For each of the following cases, determine the specified properties and show the states on a sketch of the T-u diagram.
|
State null hypotheses for the researchers test
: State the null and alternative hypotheses for the researchers test - explain in the context of this scenario the meaning of Type I and Type II errors.
|
Demo availability and the latest version
: Research two more alternatives for CASE tools. Include cost, demo availability and the latest version. Be sure to include your references.
|
Why it is important to consider different risk measures
: Why it is important to consider different risk measures? Which risk measures would you consider in the analysis of your own portfolio given your preferences as an investor? How many stocks. Based on the article linked above.
|
Project identification and business environment
: Establish authorities and responsibilities for database security management. Develop operational and incident management procedures when security breaches are discovered.
|
Choosing a particular layout
: Please name at least two other layouts and describe what type of information you would put on those particular slides. What is your deciding factor when choosing a particular layout?
|
Review on global geopolitics
: There is no doubt that global geopolitics has affected the way of life of millions of people in the world today. Some countries have had their rights and freedom suppressed whereas others have had their dreams cut off
|
A short note advertisement and Basic accounting assumptions
: A short note Advertisement in one page and Basic accounting assumptions or concepts
|
Redundancy and data independence play
: 1. Differentiate the role that data redundancy and data independence play in the database management system concept. Is either of these concepts desirable for a database? Explain your decision for choosing the concept that is desirable.
|