Secure organization''s database

Assignment Help Basic Computer Science
Reference no: EM13760847

Submit a security plan to secure the organization's database. The security plan will be submitted to the CIO. The organization has many concerns about unauthorized access, since there have been reports that some confidential information has been accessed from the database.

Specifically, the CIO would like a plan that will ensure log files can be reviewed to determine who accessed the data, when it was accessed, and what was changed in the database. To complete this task, you will need to examine the DBMS used by your organization and identify the current security measures provided.

You can view the SQL Server log files by logging into the VDI. Following are the types of log files you can access using the Log File viewer.
Audit Collection
Data Collection
Job History
Maintenance Plans
SQL Server
SQL Server Agent
After reviewing these files, list the potential threats that could occur and propose countermeasures to overcome them. Describe the use of potential uses of cloud computing services by your organization and list the potential threats, implications, and countermeasures.

Reference no: EM13760847

Questions Cloud

Announcement in an international students magazine : Write an answer to one of the questions 2 - 4 in this part Write your answer in 220 - 260 words in an appropriate style on the separate answer sheet Put the question number in the box at the top of the page
Market-based evaluation method : Create an argument supporting that using the market-based valuation method yields the most accurate results. Provide support for your argument.
Geographic and demographic segmentation strategies : Geographic and demographic segmentation strategies are two of the most common strategies for segmenting markets. What would be included in each? What are the benefit of both type of segmentation strategies? Behavioral segmentation is a potentially ve..
The influence of culture and genetics on health : The family's culture and genetic history influence your communication and approach in addressing their health risks.
Secure organization''s database : Submit a security plan to secure the organization's database. The security plan will be submitted to the CIO. The organization has many concerns about unauthorized access, since there have been reports that some confidential information has been a..
Some of the objectives associated with service layouts : What type of layout is commonly used in service? what are some of the objectives associated with service layouts?
Problem regarding the estate planning : Explain the key benefits of estate planning. Provide at least one (1) scenario to show the impact that improper estate planning can have on family members.
Pecification for plastic liner for concrete highway project : The specification for a plastic liner for concrete highway projects calls for a thickness of 3.0 mm 0.2 mm. The standard deviation of the process is estimated to be 0.02 mm. The process is known to operate at a mean thickness of 3.0 mm.
Write a biography on countrys top fifty deal makers : Write a 1000 word biography on your chosen member of "The Country's Top 50 Deal Makers, Influence Pedlars, and Backroom Operators", according to Canadian Business Magazine.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Secure protocol

Assume that Alice shares a secret s with her company's server computer.

  Which layers in the tcp/ip protocol suite need to be changed

In an internet, we change the LAN (Local Area Network) technology to a new one? Which layers in the TCP/IP protocol suite need to be changed?

  What is the output of the following sequence of loops

What is the output of the following sequence of loops

  Peoplesharz is aiming to become financially self-sufficient

PeopleSharz is aiming to become financially self-sufficient by the end of 2014 at the latest. It is at this time that their venture capital funds will be exhausted but they estimate, once they hit the 50M user mark, and have deployed into production ..

  When the jmpc field in the microinstruction is enabled

Assume that when the JMPC field in the microinstruction is enabled (set), MBR is ORed with NEXT_ADDRESS to determine the address of the next microinstruction to be executed

  Flight availability request application

Define a simple Web Service in WSDL that returns flight information regarding flights of a particular flight operator, see the first question

  Find the solution to each of these recurrence

Find the solution to each of these recurrence relations with the given intial conditions. Use an iterative approach.

  Mini case: k-mart

Mini Case: K-Mart

  Find parity of binary number stored in accumulator

Use an algorithm similar to one in Question 1 to find the parity (odd/even) of a binary number stored in the accumulator.

  How do providing goods and services for government differ

How do providing goods and services for the government differ from providing goods and services for other organizations?

  How can you delete the windows old folder

How can you delete the Windows old folder.

  Explaining role-computer forensic investigator for law firm

You are the computer forensic investigator for a law firm. The firm acquired a new client, a young woman who was fired from her job for inappropriate files discovered on her computer

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd