Physical environment for secured databases

Assignment Help Management Information Sys
Reference no: EM13813539

For Lady Only

 

Through this real-world project you will design a secure, scalable, and responsive database security plan and requirements definition document for a system of your choice. Your chief security officer has given you the assignment of defining, developing, and documenting a database security policy and plan for your databases. This document shall define who is responsible for security in your organization and what authority is granted to that person in the advent of a security breach. Additionally, policies and procedures should be defined and documented that outline the daily administrative tasks, definition of security rules and methods, and the enforcement of those rules. Your job is not to implement the requirements but to define what the requirements are and to document them. While working on your project, assume the roles of the chief security officer, database designer, database administrator, and chief applications designer.

Part 1: Project Identification and Business Environment --

Address the following topics as they apply to your policy:

Establish authorities and responsibilities for database security management.

Develop operational and incident management procedures when security breaches are discovered.

Define personnel and procedures for daily administration and maintenance of security policies.

Part 2: Architecture and Operating System Considerations --

Address the following topics as they apply to your policy:

Define the architecture for your system. Does it use client server, web, or application servers? Given the architecture, elaborate on what methods will be used in your database to support this architecture. Consider the following elements in the formulation of your policy:

Integration of DBMS security with client applications and operating systems

Integration of DBMS security with network operations

Integration of DBMS security with server operating systems

Integration of DBMS security with web servers and application servers

Define requirements as they relate to database security. This includes, but is not limited to: connection pooling, proxies, application

roles, file permissions, privileged accounts, password requirements, and other methods appropriate to your selection.

Part 3: User Accounts and Password Administration --

Address the following topics as they apply to your policy:

User administration

Password policies

Profile definitions and assignments. What is the criterion for assignment of a profile to an account?

Part 4: Privileges and Roles --

Address the following topics as they apply to your policy.

Security model selection

Roles, including privileged roles assignment and administration and role policies

System privileges

Object privileges

Part 5: Database Security Operations --

Address the following topics as they apply to your policy

Requirements and methodology for database logging

Requirements and methodology for activity auditing

Part 6: Data Isolation Policies --

Address the following topics as they apply to your policy:

Requirements for data isolation

Database views

Database triggers

Database stored procedures

Part 7: Physical Environment for Secured Databases --

Address the following topics as they apply to your policy:

Use of physical security and control mechanisms systems

Database backup and restore practices relating to security

Part 8: Conclusion, Summary, and References --

Develop a summary and conclusion for your paper

Cite your references

Reference no: EM13813539

Questions Cloud

Demand and supply of certain resources in australia : Cost of production- in any industry in Australia where costs of production are an important issue and analyse what is being done in the industry. May be the industry is switching to technology or/and some substitutes have been used to overcome thi..
Maintain safe and healthy workplaces : Explain how each of the following HR practices can be used to maintain safe and healthy workplaces: job analysis, selection, training, performance measurement and feedback, and incentives.
What is most important similarity between jainism vs sikhism : What do you think is the most important similarity and which is the most important difference? Use specifics to support your answer.
Purchase a one-month put option with a strike price : The market price of ZYX stock has been volatile and you expect that volatility to continue for a few weeks based on recent news. Due to this belief you decide to purchase calls and puts to manage your exposure. You also purchase a one-month put optio..
Physical environment for secured databases : Physical Environment for Secured Databases
Disparity in the indian healthcare system : Reflect on quality health outcomes, utilization, and disparity in the Indian healthcare system. India's healthcare infrastructure has not kept pace with the economic development.
What information is the most critical for you to have right : You are the EH&S professional at your company's shipyard. You have just received a call from a production supervisor that there has been a very serious near miss accident out in the assembly area. What information is the most critical for you to ha..
Growth of hospitals and health care systems : "Growth of Hospitals and Health Care Systems with Benefits of Long-Term Care Facilities"  Please respond to the following:
Mental health care administration and payment plan : Mental Health Care Administration and Payment Plan" Please respond to the following:

Reviews

Write a Review

Management Information Sys Questions & Answers

  What is a firms supply chain

What is a firms supply chain? What are the primary techniques a supply chain management (SCM) system relies on? How do these approaches offer the chance to increase operational excellence?

  Describe at least three categories of physical media in use

describe at least three categories of physical media in use in telecommunications networks today. which of these media

  How will companies like aol survive

Dail-up Technology and Is dial-up a dying technology? If so, how will companies like AOL survive?

  1 describe some of the reasons that early dot-com companies

1. describe some of the reasons that early dot-com companies had an initial advantage over traditional companies in

  Major issue within the united states

Is the digital divide a major issue within the United States or across the globe?

  Why should a business use microsoft xp pro

Why should a business use Microsoft XP pro - Advantages and disadvatages compared to the others.

  Examples of logical and physical integration issues

Pick an organization that you know of or where you are/were working and provide examples of logical and physical integration issues that were faced by the organization when they broke the functional silos and moved to integrated systems.

  Case study thought it was safer than starting his own

case study thought it was safer than starting his own business after nearly thirty years of employment which ended as a

  Management information system assignment

Explain how one/all these different systems (TPS, MIS, DSS, and ESS) servers the various levels of management in your organization?

  Explain iso 9000 and its role in supply chains

Explain ISO 9000 and its role in supply chains. Search the Internet for an example of a company that is ISO 9000 certified and search its website for any reference to why it became certified and/or what that means to its customers. Share your find..

  Advantages amp disadvantages of customized softwarea

advantages amp disadvantages of customized software.a company may take a highly informal approach to purchasing

  Technology as the way to move forward to successwhat are

technology as the way to move forward to successwhat are some real-world examples of how organizations that embrace

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd