Project identification and business environment

Assignment Help Basic Computer Science
Reference no: EM131092855

Applied research project report submission.

TOPIC: DATABASE SECURITY AND HOW IT SHOULD BE APPLIED IN AMAZON OPERATING SYSTEM ENVIRONMENT.

Part 1: Project Identification and Business Environment

Address the following topics as they apply to your policy:

  1. Establish authorities and responsibilities for database security management.
  2. Develop operational and incident management procedures when security breaches are discovered.
  3. Define personnel and procedures for daily administration and maintenance of security policies.

Part 2: Architecture and Operating System Considerations

Address the following topics as they apply to your policy:

  1. Define the architecture for your system. Does it use client server, web, or application servers? Given the architecture, elaborate on what methods will be used in your database to support this architecture. Consider the following elements in the formulation of your policy:
    • Integration of DBMS security with client applications and operating systems
    • Integration of DBMS security with network operations
    • Integration of DBMS security with server operating systems
    • Integration of DBMS security with web servers and application servers
  2. Define requirements as they relate to database security. This includes, but is not limited to: connection pooling, proxies, application roles, file permissions, privileged accounts, password requirements, and other methods appropriate to your selection.

Part 3: User Accounts and Password Administration

Address the following topics as they apply to your policy:

  1. User administration
  2. Password policies
  3. Profile definitions and assignments. What is the criterion for assignment of a profile to an account?

Part 4: Privileges and Roles

Address the following topics as they apply to your policy.

  1. Security model selection
  2. Roles, including privileged roles assignment and administration and role policies
  3. System privileges
  4. Object privileges

Part 5: Database Security Operations

Address the following topics as they apply to your policy

  1. Requirements and methodology for database logging
  2. Requirements and methodology for activity auditing

Part 6: Data Isolation Policies

Address the following topics as they apply to your policy:

  1. Requirements for data isolation
  2. Database views
  3. Database triggers
  4. Database stored procedures

Part 7: Physical Environment for Secured Databases

Address the following topics as they apply to your policy:

  1. Use of physical security and control mechanisms systems
  2. Database backup and restore practices relating to security

Part 8: Conclusion, Summary, and References

  1. Develop a summary and conclusion for your paper
  2. Cite your references

Reference no: EM131092855

Questions Cloud

Determine the specified properties : For each of the following cases, determine the specified properties and show the states on a sketch of the T-u diagram.
State null hypotheses for the researchers test : State the null and alternative hypotheses for the researchers test - explain in the context of this scenario the meaning of Type I and Type II errors.
Demo availability and the latest version : Research two more alternatives for CASE tools. Include cost, demo availability and the latest version. Be sure to include your references.
Why it is important to consider different risk measures : Why it is important to consider different risk measures? Which risk measures would you consider in the analysis of your own portfolio given your preferences as an investor? How many stocks. Based on the article linked above.
Project identification and business environment : Establish authorities and responsibilities for database security management. Develop operational and incident management procedures when security breaches are discovered.
Choosing a particular layout : Please name at least two other layouts and describe what type of information you would put on those particular slides. What is your deciding factor when choosing a particular layout?
Review on global geopolitics : There is no doubt that global geopolitics has affected the way of life of millions of people in the world today. Some countries have had their rights and freedom suppressed whereas others have had their dreams cut off
A short note advertisement and Basic accounting assumptions : A short note Advertisement in one page  and Basic accounting assumptions or concepts
Redundancy and data independence play : 1. Differentiate the role that data redundancy and data independence play in the database management system concept. Is either of these concepts desirable for a database? Explain your decision for choosing the concept that is desirable.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Adobe connect technology within the course area

Based on the topic and outline from previous units, you will make a formal oral presentation to your instructor and peers. You will be required to present for 10-12 minutes using the Adobe Connect technology within the course area. Specifically, y..

  Explain how the web design department

Explain how the web design department will adhere to a code of ethics available for stakeholders.

  Describe which of the five principal forms of resolution

Analyse the stages through which it passed. In particular, describe which of the five principal forms of resolution described in the Lecture Notes was achieved at its conclusion-or temporary cessation.

  Create a network diagram and explain in detail

Each switch connects to a centralized router on a different interface, giving one subnetwork for each floor of the network, plus one for the server farm, one for the DMZ, and one for the Internet. Determine how many ports the router needs.

  Fsm packet sending and receiving protocols

Consider a scenario in which a Host, A, wants to simultaneously send messages to Hosts B, C, and D. A is connected to B, C, and D via a broadcast channel, and a packet sent by A is carried by this channel to each of B, C, and D.

  Technical architecture document

Quality assurance process and procedures to ensure the functionality and performance requirements are met Testing procedures to ensure the application is operational at all levels (program, network, systems, and interfaces) Implementation steps an..

  Describe the efforts underway in the miniaturization

Describe the efforts underway in the miniaturization of integrated circuits when moving from the micrometer scale to the nanometer scale using nanotechnology.

  Create a program with the following specifications

Create a program with the following specifications: Reserve space in memory for an array of words of size 10. Use the '.space' directive. The array is called my array.

  Physics laws applied to electro-magnetism

Let's discuss examples of Physics Laws applied to Electro-Magnetism e.g. besides that of Ohm's Law which is the most widely know, what about Faraday's Law? Are there others? Let's discuss..

  Utilize the lirn library

Write a 2 page research paper (excluding the title page) on logical, circular, and arithmetic shift operations. Use an example not discussed in the textbook to explain these shift operations.

  Write a program calculates and displays the pay to workers

Create 3 workers and initialize their member variables with any data you choose. Store the workers in a Linked List. Write a function that will traverse the list of workers calculating and displaying the amount of pay each worker has earned.

  Explaining information assurance needs

For Milestone Three, you will prepare and submit a three-slide presentation explaining information assurance needs includingrisks associated with non-adherence to information assurance processes, and countermeasures to mitigate risks.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd