Question

In: Computer Science

Upon opening your browser early one morning, you see a Yahoo! News story about an arrest...

Upon opening your browser early one morning, you see a Yahoo! News story about an arrest that was made the previous day involving a major cybercrime ring. As you read more of the story, it seems that authorities are going through computers and servers seized from the criminals' offices and have identified more than 20 companies that may have had their customer and retail transactions compromised. One of the companies listed, it turns out, was SuperMart, Inc., the company for which you have been employed as a database administrator for the past nine years. You leave a message on the office phone of your superior, John Dalton, the CIO of SuperMart.

SuperMart is a medium-sized retail company that evolved from a grocery chain in the 1980s. While the corporation has 200 stores, primarily in your region of the country, it carries a full line of grocery and household items in large outlets that are linked by a very up-to-date computer network with real-time integration of data into a series of databases. Your department has been working on a project that will be transferring all data into a data warehouse and streamlining data mining operations. Security for the system is handled by a security department for physical security, an IT security division of the network administration department, and by the team of data security and privacy specialists within your own data management department.

Even in these early moments of this possible breach of security, after your shock wears off, you understand that the CIO's response will be to meet immediately with all security personnel, with the database administrator, the network manager, the corporate legal team, and possibly the CEO and CFO. You have assigned your assistant to get as much information as possible from authorities, and you are making initial notes on a plan to proceed with SuperMart's response to such a potentially toxic data breach.

Using the scenario above research and discuss the 3 topics below.

  • Explain the tools available to database administrators that would prevent security breaches such as the one that may have occurred at SuperMart.
  • Describe the strategies that are available to database administrators that would prevent security breaches such as the one that may have occurred at SuperMart.
  • Identify the laws, rules, and standards that may be applicable to SuperMart and this possible security breach.

Solutions

Expert Solution

Explain the tools available to database administrators that would prevent security breaches such as the one that may have occurred at SuperMart.

- There are plenty of tools available to prevent security breaches but the most advanced and helpful are as follows:

1) SIEM : Security Information and Event Management

It centrally collects data from multiple devices on your network, including your existing security appliances. With the use of advanced correlation engine, it is able to proactively identify security events not otherwise detected by standalone security technology

2) EDR : Endpoint Detection and Response

it prevents security breaches with endpoint detection and response with the help of artificial intelligence.

3) Patch management

It is a simple process that tends to be overlooked by already overwhelmed IT employees but, to prevent security breaches, this can have the biggest impact

4) Vulnerability Management

Performing only a single vulnerability scan each year or quarter puts organizations at risk of not uncovering new vulnerabilities.

Describe the strategies that are available to database administrators that would prevent security breaches such as the one that may have occurred at SuperMart.

- Train your employees and educate them about cybersecurity

- Protect the data

- Enforce strong passwords wide and schedule changes at least every six months

- Monitor data and its transfer this will prevent the data form being misued or exploited

- Limit access to certain systems by people who are not connected to the department and make sure the sensitive data is handled only by relevant professionals

- Patch vulnerabilities

- Encypt devices and data as they are more prone and vulnerable to attacks

- Two-factor authentication

- Limit Downloading

- Always keep a Breach Recovery Plan

Identify the laws, rules, and standards that may be applicable to SuperMart and this possible security breach

- The National Conference of State Legislatures

- Directive on Privacy and Electronic Communications


Related Solutions

Upon opening your browser early one morning, you see a Yahoo! News story about an arrest...
Upon opening your browser early one morning, you see a Yahoo! News story about an arrest that was made the previous day involving a major cybercrime ring. As you read more of the story, it seems that authorities are going through computers and servers seized from the criminals' offices and have identified more than 20 companies that may have had their customer and retail transactions compromised. One of the companies listed, it turns out, was SuperMart, Inc., the company for...
In this module, you will look for an article or news story/video that relates to one...
In this module, you will look for an article or news story/video that relates to one or more of the following topics: Magnetic flux (which is not a flux capacitor) Induction and inductors RL circuits LC circuits Transformers (not Autobots or Decepticons, though) These are pretty broad topics, but a few ideas should spring readily to mind. By the end of the third day of the module, create a thread with a 250-word post including one or more of the...
In this module, you will look for an article or news story/video that relates to one...
In this module, you will look for an article or news story/video that relates to one or more of the following topics: Maxwell's equations Electromagnetic waves and energy flow Polarization Reflected or refracted light These are pretty broad topics, but a few ideas should spring readily to mind. By the end of the third day of the module, create a thread with a 250-word post including one or more of the topics listed above, an active hyperlink to your resource...
In this module, you will look for an article or news story/video that relates to one...
In this module, you will look for an article or news story/video that relates to one or more of the following topics: Magnetic flux (which is not a flux capacitor) Induction and inductors RL circuits LC circuits Transformers (not Autobots or Decepticons, though) These are pretty broad topics, but a few ideas should spring readily to mind. By the end of the third day of the module, create a thread with a 250-word post including one or more of the...
In this module, you will look for an article or news story/video that relates to one...
In this module, you will look for an article or news story/video that relates to one or more of the following topics: displacement in two or three dimensions speed in two or three dimensions velocity in two or three dimensions acceleration in two or three dimensions By the end of the third day of the module, create a thread with a 250-word post including one or more of the topics listed above, an active hyperlink to your resource (this resource...
In this module, you will look for an article or news story/video that relates to one...
In this module, you will look for an article or news story/video that relates to one or more of the following topics: Magnetic fields Force/Torque due to a magnetic field Magnetic fields due to electric currents Solenoids or toroids These are pretty broad topics, but a few ideas should spring readily to mind. Create a 250-word post including one or more of the topics listed above, an active hyperlink to your resource (this resource cannot be used by another student),...
In this module, you will look for an article or news story/video that relates to one...
In this module, you will look for an article or news story/video that relates to one or more of the following topics: Conservative versus non-conservative forces Potential Energy Conservation of energy (as it relates to physics, not environmental friendliness) These are pretty broad topics, but a few ideas should spring readily to mind. By the end of the third day of the module, create a thread with a 250-word post including one or more of the topics listed above, an...
A story about your unique value A story about the perception you create around you A...
A story about your unique value A story about the perception you create around you A story about your motivators A story which defines or demonstrates your found purpose A story of your victory A story about how do you lead or how are you best guided?
Suppose that one day you read a news story reporting that result of a survey indicate...
Suppose that one day you read a news story reporting that result of a survey indicate that 40% of women and 30% of men have little or no interest in sex . How could you use critical thinking to interpret this report? What kinds of questions would you ask about the source of the data, the way the study was conducted ,and the background of the participants?
Examine the financial ratios, stock valuation and news about Amazon. Do you see the firm’s share...
Examine the financial ratios, stock valuation and news about Amazon. Do you see the firm’s share price rising/decreasing in the near-, intermediate- and long-term? Do you believe the firm has a stable future of sustainable growth, currently stagnant, or is heading for financial failure? Why?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT