Verify your implementation by viewing the data dictionary

Assignment Help Database Management System
Reference no: EM13753482

Part -1:

Case: Oracle Security

You are hired as a database administrator for a small reseller company to implement and administer the database component of their main application.The data model of this application is presented inFigure 4-20. The schema owner is called DBSEC.

a. Use the scripts provided to create a schema.

b. Create three different profiles based on the criteria listed in Table 4-7.

Table 4-7 Profile configuration requirements

Profile 

Resources

Password

DBSEC_ADMIN_PROF

SESSIONS_PER_USER = 5
CONNECT_TIME = 8 hours
IDLE_TIME = 1 hour

PASSWORD_LIFE_TIME = 1 month
PASSWORD_GRACE_TIME = 7 days 

DBSEC_DEVELOPER_PROF

CONNECT_TIME = 12 hours
IDLE_TIME = 2 hours
CPU_PER_CALL = 1 minute

PASSWORD_LIFE_TIME = 1 month
PASSWORD_GRACE_TIME = 14 days

DBSEC_DEVELOPER_PROF

SESSIONS_PER_USER = 1 
CPU_PER_CALL = 5 seconds
CONNECT_TIME = 8 hours
IDLE_TIME = 30 minutes 
LOGICAL_READS_PER_CALL = 10 KB 

FAILED_LOGIN_ATTEMPTS = 1
PASSWORD_LIFE_TIME = 1 month
PASSWORD_LOCK_TIME = 3 days
PASSWORD_GRACE_TIME = 14 days

c. Create four different roles that have privileges according to the specification outlined inTable 4-8.

Table 4-8 Roles and privileges configuration requirements

Role Name

Privileges

DBSEC_ADMIN_ROLE

SELECT and ALTER on all DBSEC tables

DBSEC_CLERK_ROLE

SELECT,INSERT,and UPDATE on all DBSEC tables

DBSEC_SUPERVISOR_ROLE

SELECT,INSERT,UPDATE,and DELETE on all DBSEC tables

DBSEC_QUERY_ROLE

SELECT on all DBSEC tables

d. After creating these profiles and roles,create users according to the specifications in Table 4-9.

User Name

Role

Profile

DBSEC_ADMIN

DBSEC_ADMIN_ROLE

DBSEC_ADMIN_PROF

DBSEC_CLERK

DBSEC_CLERK_ROLE

DBSEC_CLERK_PROF

DBSEC_SUPER

DBSEC_SUPERVISOR_ROLE

DBSEC_CLERK_PROF

DBSEC_QUERY1

DBSEC_QUERY_ROLE

DBSEC_CLERK_PROF

DBSEC_QUERY2

DBSEC_QUERY_ROLE

DBSEC_CLERK_PROF

DBSEC_DEVELOPER

DBSEC_ADMIN_ROLE + DBSEC_SUPERVISOR_ROLE

DBSEC_DEVELOPER_PROF

e. Verify your implementation by viewing the data dictionary.

Case SQL Server Security

You are the DBA for Acme Corporation.You're asked to implement a new database server usingMicrosoft SQL Server.In any implementation,security needs to be a theme woven throughouttheproject,not an afterthought. Design an implementation that allows you to implement policies. The design should also include a role-based security structure. The business requirements for the database are as follows:

  • No user should have delete access to any object.
  • Human Resources needs to be able to fully manage employee data.
  • Customer Service needs to be able to make changes to existing customers and vieworder data.
  • Customer account managers need to be able to fully manage customer data and orders.
  • Sales needs to be able to view customer data and fully manage orders.
  • Marketing needs to able to pull quarterly sales numbers to analyze.

Follow these steps to produce a solution:

1. Install SQL Server using the Windows Integrated security mode.

2. Use a Window user for the service accounts.

3. Demote built-in\administrators to security and create a DBA windows group for systemadministrators.

4. Set up password policies based on best practices.

a. Use a minimum of eight characters

b. Use complex passwords

c. Set account lock-out for after three tries

d. Keep five passwords in history

e. Expire passwords after 30 days

5. Set up the roles listed in Tables 4-10 through 4-14.

Table 4-10 Human_Resources

Table

Select

Insert

Update

Delete

Employees

X

Table 4-11 Customer_Service

Table

Select

Insert

Update

Delete

Customers

 

X

Orders

 

 

X

Order Details

 

 

X

Table 4-12 Account_Managers

Table

Select

Insert

Update

Delete

Customers

X

Orders

X

Orders Details

X

Table 4-13 Sales

Table

Select

Insert

Update

Delete

Customers

 

 

X

Orders

 

 

 

X

Order Details 

 

 

 

X

Table 4-14 Marketing

Table

Select

Insert

Update

Delete

Territory

 

 

X

Orders

 

 

X

Order Details

 

 

X

Part -2:

1 Case 5-1 Secure Your Application with SQL Server IAcme Manufacturing is implementing a new Web-based ordering system for preferred customers and Pats an internal client/server application so Acme sales people can manage the orders. Implement the authorization table using any two suitable application models presented in this chapter.

Role Permissions

clerk select, update, and insert on all tables

super clerk and delete

admin super and all permissions on the authentication table

Case: Application Security with Oracle

You were hired by Acme Telecommunication Systems (ATM to implement a number of security
rain requirements. Provide the architecture of the application security model you select and the steps to
implement it. The application has the following modules:
• Account maintenance
• Call records
• Transactions
• Call monitoring
• Backup and restore
• Security
The following ATS users will be accessing the system:
• Sammy Bright
• Tom Lord
• Linda Glass
• loan Knight
• James Howell
• Dennis Wright
• Ray Stevenson
• Phil Magnet
• Kate Davis

ATS requested the following security implementation: Roles
Role Rank
Service 0
Operator 1
Supervisor 2
Administrator 3
CEO 4
Privileges
Privilege Rank
query 0
update 1
delete 2
grant 3

Module-Role

 

 

 

 

 

Module

Service

Operator

Supervisor

Administrator

CEO

Account maintenance

query

update

delete

grant

query

Call records

 

update

delete

grant

query

Transactions

 

update

delete

grant

query

Call monitoring Backup and restore

delete

query

query

grant
grant

query

Security

 

query

 

grant

query

User-Role

 

 

 

 

 

User

Service

Operator

Supervisor

Administrator

CEO

Sammy Bright

X

 

X

 

 

Toni Lord

X

X

 

 

 

Linda Glass

 

 

 

X

 

Joan Knight

X

X

X

 

 

James Howell

X

 

 

 

 

Dennis Wright

 

 

X

 

 

Ray Stevenson

 

X

 

 

 

Phil Magnet

 

X

 

 

 

Kate Davis

 

 

 

 

X

Reference no: EM13753482

Questions Cloud

Future performance of the firm : Valuation of a firm's financial assets is said to be based on what is expected in the future, in terms of the future performance of the firm, the industry, and the economy.
The federal long-term tax-exempt rate : Through a “Type B” reorganization, Golden Corporation acquired 90% of Retriever Co stock by October 2 of the current tax year ending December 31. At the time the 90% was acquired, Retriever Co was worth $800,000 and the Federal long-term tax-exempt r..
Develop an application that allows the input and updating : Develop an application that allows the input, updating, and deletion of customers, homes, salespersons, and sales from your Reston Real Estate (RRE) Oracle database FA14-CMIS440-485 that you have been using since Project #2
Prepare general journal entries : Merry land's had inventory balance $32 570 at close of accounting period. the following sales & purchases are for current period. Prepare general journal entries (ignoring GST) assuming: 1. a periodic inventory system is used 2. a perpetual inventory..
Verify your implementation by viewing the data dictionary : Implement the authorization table using any two suitable application models presented - Use the scripts provided to create a schema - Create three different profiles based on the criteria.
Company more than just periodic interest payments : Assume that a company issues a bond at 92 having a face value of $5,000 and a coupon interest rate of 6%. The bond pays interest annually and has a five-year-maturity time frame, and bonds of similar risk are currently paying interest rates of 8%.
Identify five different it systems : Identify five different IT systems that have affected business in the past few years (i.e., business software applications, networks, hardware, internet-based technologies, databases)
Legal definition of the crime : What is the legal definition of the crime of obtaining goods by false pretenses?  Do the facts in the case satisfy the definition?  Explain.
Distributive share of the partnership passive taxable income : Where on the tax return is the following reported? Distribution of $4800 from ST Partnership. Her distributive share of the partnership passive taxable income was $5300. She had no prior passive losses.

Reviews

Write a Review

Database Management System Questions & Answers

  Business development activity cost pool

How much cost, in total, would be allocated to the Working On Engagements activity cost pool and how much cost, in total, would be allocated to the Business Development activity cost pool?

  Validate the logical model using normalization

Your Learning Team has been hired as database consultants for a start-up company that will stream movies over the Internet (similar to Hulu, Netflix, and others). Validate the logical model using normalization

  Your database has been a hit you have been called back to

your database has been a hit. you have been called back to the customers headquarters and they want a detailed report

  Create an arff file with the data types

Create an arff file with the following data types, flags, unit_id, names must be nominal and timestamps (ts) must be date

  Explain a minimum of three 3 heuristics to optimize

your supervisors and customers are very impressed with the database you have put together. however there is still that

  Advantages and disadvantages of working with multiple tables

Write down the advantages and disadvantages of working with multiple tables? Write an example of situation where multiple tables would be suitable in the application.

  What is the key value of the 4th index

What is the key value of the 4th index record on the top level, assuming each index record points to the record with the highest key value in a block of the next level down?

  Provide the sql to amend the original table design

You have been given the following specifications of a simple database for a netball association that keeps record of players, teams and matches.

  What is the purpose of a database driver

what is the purpose of a database driver in terms of what it connects and What are some other examples of Database Drivers out there for the J2EE and .NET Platforms?

  1 the appropriate sql statements for each query which

1. the appropriate sql statements for each query which should be copied from your sql code in mysql and pasted into

  Entity-relationship diagram

Create an entity-relationship diagram and design accompanying table layout using sound relational modeling practices and concepts.

  Demodulator circuits and amplitude modulator

Explain how much the modulating signal power is required to generate 100 percent modulation? What is the approximate center frequency of filter required to pass the lower sideband?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd