What do you meant by database security

Assignment Help Management Information Sys
Reference no: EM1325301

Analysis of Database Security

Scenario: ABC company is a small, but growing manufacturing company with revenues of approximately $25 million. Until now, the company has had a single headquarters and production facility in a Midwestern city, but it is building a separate sales office on the east coast which will open in a few months.

You are the Manager of IT at ABC, and you have been responsible for operating a basic set of computer applications in the Midwest office: order entry and fulfillment, financial and accounting systems, e-mail, and general office automation (word processing, etc.) You have been maintaining a Local Area Network connecting the office desktop computers to each other and to the applications running on the company servers, but there has been no access to these systems from outside the office.

You have been told by senior management that when the new sales office opens, the east coast staff must be able to enter new orders directly into the home office system using their desktop computers. They also need access to customer records and order status information. Furthermore, management wants to implement a new company website for customers to place orders online and to view their ordering history, current order status, and financial statement information without calling customer service.

You realize there are huge security implications implied by these changes. You have been uneasy in the past because the company has lacked a comprehensive computer security policy. Furthermore, most employees have not really understood all the security issues in the old "internal" computing environment. The new configuration with its networked offices and Internet-accessible elements will require more security awareness than ever. You see this as your opportunity, and imperative, to move the company to accept a formal corporate security standard. In the weeks ahead, you will begin to educate both management and system users regarding the components, necessity, and use of security standards for all of the new technologies that will be used, as well as for the current technology they have been using. In the end, you will develop all of this together into a complete corporate security program proposal.

Task Details: ABC Manufacturing has a number of internal databases which are of particular importance to the business. Some of these databases detail the company's manufacturing processes and formulae, including the unique ways to control manufacturing costs. These processes and formulae are particularly sensitive in this industry because ABC produces low-margin commodity products with little price flexibility. Some other databases have customer-specific sales contract information. Senior management recognizes that this mission critical information must be protected from loss and from unauthorized disclosure in order to preserve the company's competitive edge.

You need to explain the following to senior management:

What is meant by Database Security?
What are the essential considerations in Database Security?
How are they specifically relevant to ABC's planned computing environment?

Reference no: EM1325301

Questions Cloud

Characterize the company''s personnel as its human asset : Why do we characterize the company's personnel as its human asset? Explain and exemplify.
Reaons of econcomic recovery and collapse : What is one of the single most important factors to judge whether a country is recovering from the global economic recession?
Discuss the civil remedies : Explain what the civil remedies are in the examples above, including why civil remedies may be used to combat criminal acts. Also, provide additional examples.
Environmental regulation in two east asian countries : Your firm has been investigating the possibility of locating facilities in East Asian country such as Thailand, Malaysia, Taiwan, or Singapore. Explain the level of environmental regulation in any 2 of these countries. Explain the 2 selected countr..
What do you meant by database security : What is meant by Database Security and What are the essential considerations in Database Security and How are they specifically relevant to ABC's planned computing environment?
What is time estimate : How does an estimator arrive at a time estimate for a particular task.
Explain the origins of the tort liabiliy : Should both civil and criminal court cases be proven in the same manner? In other words, should either preponderance of evidence and beyond reasonable doubt be abolished and/or replaced with one standard of proof? Why?
Explain about business and society : Explain about Business and Society and believe shape the relationship between business and society
Briefly explain the difference mesh, bus, ring, and star top : Briefly explain the difference, including advantages and disadvantages Ethernet, Token Ring, FDDI, and Wireless.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd