Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

For Lady Only

 

Through this real-world project you will design a secure, scalable, and responsive database security plan and requirements definition document for a system of your choice. Your chief security officer has given you the assignment of defining, developing, and documenting a database security policy and plan for your databases. This document shall define who is responsible for security in your organization and what authority is granted to that person in the advent of a security breach. Additionally, policies and procedures should be defined and documented that outline the daily administrative tasks, definition of security rules and methods, and the enforcement of those rules. Your job is not to implement the requirements but to define what the requirements are and to document them. While working on your project, assume the roles of the chief security officer, database designer, database administrator, and chief applications designer.

Part 1: Project Identification and Business Environment --

Address the following topics as they apply to your policy:

Establish authorities and responsibilities for database security management.

Develop operational and incident management procedures when security breaches are discovered.

Define personnel and procedures for daily administration and maintenance of security policies.

Part 2: Architecture and Operating System Considerations --

Address the following topics as they apply to your policy:

Define the architecture for your system. Does it use client server, web, or application servers? Given the architecture, elaborate on what methods will be used in your database to support this architecture. Consider the following elements in the formulation of your policy:

Integration of DBMS security with client applications and operating systems

Integration of DBMS security with network operations

Integration of DBMS security with server operating systems

Integration of DBMS security with web servers and application servers

Define requirements as they relate to database security. This includes, but is not limited to: connection pooling, proxies, application

roles, file permissions, privileged accounts, password requirements, and other methods appropriate to your selection.

Part 3: User Accounts and Password Administration --

Address the following topics as they apply to your policy:

User administration

Password policies

Profile definitions and assignments. What is the criterion for assignment of a profile to an account?

Part 4: Privileges and Roles --

Address the following topics as they apply to your policy.

Security model selection

Roles, including privileged roles assignment and administration and role policies

System privileges

Object privileges

Part 5: Database Security Operations --

Address the following topics as they apply to your policy

Requirements and methodology for database logging

Requirements and methodology for activity auditing

Part 6: Data Isolation Policies --

Address the following topics as they apply to your policy:

Requirements for data isolation

Database views

Database triggers

Database stored procedures

Part 7: Physical Environment for Secured Databases --

Address the following topics as they apply to your policy:

Use of physical security and control mechanisms systems

Database backup and restore practices relating to security

Part 8: Conclusion, Summary, and References --

Develop a summary and conclusion for your paper

Cite your references

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M91383470
  • Price:- $110

Guranteed 48 Hours Delivery, In Price:- $110

Have any Question?


Related Questions in Management Information System

In this assessment you will design and code a java console

In this assessment, you will design and code a Java console application that reads in seven integer values and prints out the number of occurrences of each value. The application uses the Java single dimension array cons ...

Discussion wireless signals please respond to the

Discussion "Wireless Signals" Please respond to the following: • Describe the different types of wireless signals and how they are used in applications that support business objectives. • Analyze the maturity of each typ ...

Topic we all had the unfortunate experience of seeing how

Topic: We all had the unfortunate experience of seeing how computers can, at times, make life's journey abit more difficult. This is especially true in knowledge centric workplaces. Describe an example of a very poorly i ...

Question onea identify six major components of a computer

QUESTION ONE a) Identify six major components of a computer system. b) Describe the following with reference to systems development. 1. Structured analysis 2. Structured design c) The current trend in database systems de ...

This assignment consists of two 2 sections a project

This assignment consists of two (2) sections: a project introduction and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the sectio ...

Question suppose that you enhance an architecture by

Question : Suppose that you enhance an architecture by replacing its floating-point divider with a new hardware divider on which division is 15 times faster. For your application code running on the original hardware, 2% ...

In assignment you proposed automation for an inventory

In Assignment you proposed automation for an inventory management problem. Please respond to the following: Summarize your experience developing a workflow for the clothing store. Do not discuss details of your solution. ...

Instructionsrecently a terminated employee used his mobile

Instructions Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security department, you were asked by your ...

Provide a background of the organizationhow was the

Provide a background of the organization. How was the organization impacted? What losses did it suffer? Describe the disaster recovery and business continuity that the business had in place? What were the lessons learned ...

Question suppose we have the following measurement

Question : Suppose we have the following measurement: Frequency of floating point(FP) operations is 25%, average CPI of FP operations is equal to 4.0. Average CPI of other instructions is equal to 1.33. Calculate the ove ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As