Project identification and business environment

Assignment Help Basic Computer Science
Reference no: EM131092855

Applied research project report submission.

TOPIC: DATABASE SECURITY AND HOW IT SHOULD BE APPLIED IN AMAZON OPERATING SYSTEM ENVIRONMENT.

Part 1: Project Identification and Business Environment

Address the following topics as they apply to your policy:

  1. Establish authorities and responsibilities for database security management.
  2. Develop operational and incident management procedures when security breaches are discovered.
  3. Define personnel and procedures for daily administration and maintenance of security policies.

Part 2: Architecture and Operating System Considerations

Address the following topics as they apply to your policy:

  1. Define the architecture for your system. Does it use client server, web, or application servers? Given the architecture, elaborate on what methods will be used in your database to support this architecture. Consider the following elements in the formulation of your policy:
    • Integration of DBMS security with client applications and operating systems
    • Integration of DBMS security with network operations
    • Integration of DBMS security with server operating systems
    • Integration of DBMS security with web servers and application servers
  2. Define requirements as they relate to database security. This includes, but is not limited to: connection pooling, proxies, application roles, file permissions, privileged accounts, password requirements, and other methods appropriate to your selection.

Part 3: User Accounts and Password Administration

Address the following topics as they apply to your policy:

  1. User administration
  2. Password policies
  3. Profile definitions and assignments. What is the criterion for assignment of a profile to an account?

Part 4: Privileges and Roles

Address the following topics as they apply to your policy.

  1. Security model selection
  2. Roles, including privileged roles assignment and administration and role policies
  3. System privileges
  4. Object privileges

Part 5: Database Security Operations

Address the following topics as they apply to your policy

  1. Requirements and methodology for database logging
  2. Requirements and methodology for activity auditing

Part 6: Data Isolation Policies

Address the following topics as they apply to your policy:

  1. Requirements for data isolation
  2. Database views
  3. Database triggers
  4. Database stored procedures

Part 7: Physical Environment for Secured Databases

Address the following topics as they apply to your policy:

  1. Use of physical security and control mechanisms systems
  2. Database backup and restore practices relating to security

Part 8: Conclusion, Summary, and References

  1. Develop a summary and conclusion for your paper
  2. Cite your references

Reference no: EM131092855

Questions Cloud

Determine the specified properties : For each of the following cases, determine the specified properties and show the states on a sketch of the T-u diagram.
State null hypotheses for the researchers test : State the null and alternative hypotheses for the researchers test - explain in the context of this scenario the meaning of Type I and Type II errors.
Demo availability and the latest version : Research two more alternatives for CASE tools. Include cost, demo availability and the latest version. Be sure to include your references.
Why it is important to consider different risk measures : Why it is important to consider different risk measures? Which risk measures would you consider in the analysis of your own portfolio given your preferences as an investor? How many stocks. Based on the article linked above.
Project identification and business environment : Establish authorities and responsibilities for database security management. Develop operational and incident management procedures when security breaches are discovered.
Choosing a particular layout : Please name at least two other layouts and describe what type of information you would put on those particular slides. What is your deciding factor when choosing a particular layout?
Review on global geopolitics : There is no doubt that global geopolitics has affected the way of life of millions of people in the world today. Some countries have had their rights and freedom suppressed whereas others have had their dreams cut off
A short note advertisement and Basic accounting assumptions : A short note Advertisement in one page  and Basic accounting assumptions or concepts
Redundancy and data independence play : 1. Differentiate the role that data redundancy and data independence play in the database management system concept. Is either of these concepts desirable for a database? Explain your decision for choosing the concept that is desirable.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  In-house development and packaged solution for r-way system

Should R/Way's new system be based on file-server or client/server architecture? Why? What would be the pros and cons of selecting in-house development versus a packaged solution for the R/Way system?

  What is your all-time favorite linux-related website

What is your all-time favorite Linux-related website? Why is it your favorite (reference, utility, comic relief, etc.)?

  Use the readline() method to obtain a value from the user

Write a code segment that will analyze a numeric value provided by the user to determine if he or she is a newborn, a child, a teenager, or an adult. Make sure to include the following in your code:

  Use two arrays of integers to store two test scores

You must use 2 arrays of integers to store the 2 test scores for each student. You must use a third array to store the average and a fourth array to store the letter grade.

  Create a visual basic program

Create a Visual Basic program that creates a bill for an automobile repair shop. The shop bills customers at the rate of $35 per hour for labor. Parts and supplies are subject to a 5% sales tax.

  Research on it specialization topic

Use the selected researchable IT specialization topic ; Ongoing Issues of Data Protection in Information Technologycomplete the following tasks in a Microsoft Word document: Develop two open research questions and discuss why the problem of each ..

  Resolving a name like cisco into a web server address

resolving a name like cisco into a Web server address?

  Prepare the interface which has single method decode

Prepare the interface MessageDecoder which has single method decode(String cipherText) where cipherText is the message to be decoded.

  Java source code listing

Java class files for all parts and a short report (word document) the report should include details of: 1.Input 2.output 3.Problem analysis and Algorithm design 4.Variables 5. Formatting the output 6. Main Algorithm 7. Java source code Listing 8...

  Prototyping is the best approach on a design project

Your boss decides that prototyping is the best approach on a design project. Describe to her the weaknesses and hazards associated with prototyping. Explain what you can do to minimize the risk of experiencing the hazards associated with prototyping

  In the context of internet content

In the context of Internet content that some countries prohibit, discuss how the "responsibility to prevent access" differs from the "authority to prevent entry".  Include examples.

  Question about artificial intelligence

Artificial intelligence topics include Expert Systems and Genetic Algorithms. Do you think that corporations can really use artificial intelligence to make a good business decision?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd