Secure organization''s database

Assignment Help Basic Computer Science
Reference no: EM13760847

Submit a security plan to secure the organization's database. The security plan will be submitted to the CIO. The organization has many concerns about unauthorized access, since there have been reports that some confidential information has been accessed from the database.

Specifically, the CIO would like a plan that will ensure log files can be reviewed to determine who accessed the data, when it was accessed, and what was changed in the database. To complete this task, you will need to examine the DBMS used by your organization and identify the current security measures provided.

You can view the SQL Server log files by logging into the VDI. Following are the types of log files you can access using the Log File viewer.
Audit Collection
Data Collection
Job History
Maintenance Plans
SQL Server
SQL Server Agent
After reviewing these files, list the potential threats that could occur and propose countermeasures to overcome them. Describe the use of potential uses of cloud computing services by your organization and list the potential threats, implications, and countermeasures.

Reference no: EM13760847

Questions Cloud

Announcement in an international students magazine : Write an answer to one of the questions 2 - 4 in this part Write your answer in 220 - 260 words in an appropriate style on the separate answer sheet Put the question number in the box at the top of the page
Market-based evaluation method : Create an argument supporting that using the market-based valuation method yields the most accurate results. Provide support for your argument.
Geographic and demographic segmentation strategies : Geographic and demographic segmentation strategies are two of the most common strategies for segmenting markets. What would be included in each? What are the benefit of both type of segmentation strategies? Behavioral segmentation is a potentially ve..
The influence of culture and genetics on health : The family's culture and genetic history influence your communication and approach in addressing their health risks.
Secure organization''s database : Submit a security plan to secure the organization's database. The security plan will be submitted to the CIO. The organization has many concerns about unauthorized access, since there have been reports that some confidential information has been a..
Some of the objectives associated with service layouts : What type of layout is commonly used in service? what are some of the objectives associated with service layouts?
Problem regarding the estate planning : Explain the key benefits of estate planning. Provide at least one (1) scenario to show the impact that improper estate planning can have on family members.
Pecification for plastic liner for concrete highway project : The specification for a plastic liner for concrete highway projects calls for a thickness of 3.0 mm 0.2 mm. The standard deviation of the process is estimated to be 0.02 mm. The process is known to operate at a mean thickness of 3.0 mm.
Write a biography on countrys top fifty deal makers : Write a 1000 word biography on your chosen member of "The Country's Top 50 Deal Makers, Influence Pedlars, and Backroom Operators", according to Canadian Business Magazine.

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Use this information to find a tighter bound on p

If X is a non-negative random variable with E(X) = ?, then Markov's inequality tells us that for every a, P(X ? a) ? ?/a. As we saw in class, this bound is sometimes very loose. In this problem we'll look at a situation in which extra information ..

  Exposure of the body to external radiation

exposure of the body to external radiation and ingestion or inhalation of radioactive matter

  Implement a class for complete binary trees

You should have only one member function that adds a new node(since there is only one place where a node may be added, and one member function that removes the last node of the tree.

  What type of damage these computer infections can do

Write one to two paragraphs on each topic below, and describe how it applies to the realm of data communication. Also discuss what type of damage these computer infections can do to data in a computer.

  Write an essay on turing machine explain with examples

Write an essay on turing machine explain with examples

  A subroutine in marie assembly that multiplies two value

1)Write a subroutine in MARIE assembly that multiplies two values where the arguments for this subroutine are two pointers(each pointing to a value). The routine, multiply(a,b), performs *a x *b where a's value is the address storing the value being ..

  Describe how project portfolio management

Describe how project portfolio management is used by IT departments

  Draw pictures of the list names afte

Draw pictures of the list names after each line of the following code. Show the head pointer of the list, and the values and next pointers of every node. Draw pointers as arrows, and the null pointer as a slash or X. You may assume the list is sin..

  Provide a sql statement that displays the title

Provide a SQL statement that displays the TITLE and publisher NAME of each book in the "COMPUTER" CATEGORY.

  Differentiate tv production-film and theatre production

How does TV production use technology. Is there a basic difference between TV production vis-a-vis film and theatre production?

  Write a c++ program that read an integer

Write a C++ program that read an integer.The code will check if the number is divisible by 3, it will print the number is divisible by 3.

  Create and validate html documents

Describe the structure of the World Wide Web as interconnected hypertext documents and create and validate HTML documents.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd