What do you meant by database security

Assignment Help Management Information Sys
Reference no: EM1325301

Analysis of Database Security

Scenario: ABC company is a small, but growing manufacturing company with revenues of approximately $25 million. Until now, the company has had a single headquarters and production facility in a Midwestern city, but it is building a separate sales office on the east coast which will open in a few months.

You are the Manager of IT at ABC, and you have been responsible for operating a basic set of computer applications in the Midwest office: order entry and fulfillment, financial and accounting systems, e-mail, and general office automation (word processing, etc.) You have been maintaining a Local Area Network connecting the office desktop computers to each other and to the applications running on the company servers, but there has been no access to these systems from outside the office.

You have been told by senior management that when the new sales office opens, the east coast staff must be able to enter new orders directly into the home office system using their desktop computers. They also need access to customer records and order status information. Furthermore, management wants to implement a new company website for customers to place orders online and to view their ordering history, current order status, and financial statement information without calling customer service.

You realize there are huge security implications implied by these changes. You have been uneasy in the past because the company has lacked a comprehensive computer security policy. Furthermore, most employees have not really understood all the security issues in the old "internal" computing environment. The new configuration with its networked offices and Internet-accessible elements will require more security awareness than ever. You see this as your opportunity, and imperative, to move the company to accept a formal corporate security standard. In the weeks ahead, you will begin to educate both management and system users regarding the components, necessity, and use of security standards for all of the new technologies that will be used, as well as for the current technology they have been using. In the end, you will develop all of this together into a complete corporate security program proposal.

Task Details: ABC Manufacturing has a number of internal databases which are of particular importance to the business. Some of these databases detail the company's manufacturing processes and formulae, including the unique ways to control manufacturing costs. These processes and formulae are particularly sensitive in this industry because ABC produces low-margin commodity products with little price flexibility. Some other databases have customer-specific sales contract information. Senior management recognizes that this mission critical information must be protected from loss and from unauthorized disclosure in order to preserve the company's competitive edge.

You need to explain the following to senior management:

What is meant by Database Security?
What are the essential considerations in Database Security?
How are they specifically relevant to ABC's planned computing environment?

Reference no: EM1325301

Questions Cloud

Characterize the company''s personnel as its human asset : Why do we characterize the company's personnel as its human asset? Explain and exemplify.
Reaons of econcomic recovery and collapse : What is one of the single most important factors to judge whether a country is recovering from the global economic recession?
Discuss the civil remedies : Explain what the civil remedies are in the examples above, including why civil remedies may be used to combat criminal acts. Also, provide additional examples.
Environmental regulation in two east asian countries : Your firm has been investigating the possibility of locating facilities in East Asian country such as Thailand, Malaysia, Taiwan, or Singapore. Explain the level of environmental regulation in any 2 of these countries. Explain the 2 selected countr..
What do you meant by database security : What is meant by Database Security and What are the essential considerations in Database Security and How are they specifically relevant to ABC's planned computing environment?
What is time estimate : How does an estimator arrive at a time estimate for a particular task.
Explain the origins of the tort liabiliy : Should both civil and criminal court cases be proven in the same manner? In other words, should either preponderance of evidence and beyond reasonable doubt be abolished and/or replaced with one standard of proof? Why?
Explain about business and society : Explain about Business and Society and believe shape the relationship between business and society
Briefly explain the difference mesh, bus, ring, and star top : Briefly explain the difference, including advantages and disadvantages Ethernet, Token Ring, FDDI, and Wireless.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Question about multiverse remix

Question about Multiverse Remix - The challenges of Multiverse Remix. Can you help me get started on this assignment?

  Developing global information systems

Developing Global Information Systems - challenges a company faces when developing global information systems

  Addresses decision support systems

Post addresses decision support systems -  Can you think of a situation where the type of paper clip matters a great deal?

  How they can be used to facilitate organizational purposes

Politics of Information - some of the "Politics of Information" and how they can be used to facilitate organizational purposes?

  Explain what management strategies may be adopted

In addition to technical instruments, what management strategies may be adopted in order to prevent employees from compromising information security?

  Building a web page with page-building software

Building a Web Page With page-Building Software - Submit a screenshot of your Web page and either its Uniform Resource Locator (URL) or a copy of the finished HTML page, as applicable

  Discuss different voice mail systems

Using Tips in Creating an Effective Powerpoint Presentation - The solution indicates how to design a presentation using Powerpoint. The presentation follows the tips in preparing excellent slide presentations.

  Structured explanation of sustainable mis practices

Management Information System (MIS) Practices - The response gives you a structured explanation of sustainable MIS practices

  Case study on social graphs

Case study on social graphs (the term coined by Mark Zuckerberg of Facebook) - The essay has to basically deal with the relatively new phenomenon of social networking.

  Non-it managers inputs on technology

Non-IT Managers' Inputs on Technology - identify technology that will help the business meets its goals

  Addresses web apps and document production software

This addresses web apps and document production software - Describe Web app, and give an example of a Web app program. Also, describe the difference between an ASP and a SaaS, including writing out what these acronyms stand for.

  Intrinsic and extrinsic reward

Intrinsic and Extrinsic Reward - Provide an example of intrinsic reward and an example of extrinsic reward you have met with recently.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd