Question

In: Computer Science

Many large organizations have had their database system hacked and customer data stolen. Your first task...

Many large organizations have had their database system hacked and customer data stolen. Your first task is to identify one company where their database was hacked.  Second, how should the security for the database be different than security for the rest of the system? Does it make a difference for web-based data designs? If so, how?

Solutions

Expert Solution

Ans: -

The database security is the most important factor in any organization as data is very powerful. Data can help in the growth of the company it is as important as physical devices and resources. So, the database security should be the first concern of the companies and data should be accurate, complete and kept as secure as possible. A small error in data can cause a great loss to the companies. That’s why companies are investing large amount of money on their database security mechanism.

The security mechanism of the company should be implemented with proper encrypting techniques, difficult passwords and with full backup and recovery of the data. There is the concept of visibility in the database which means that only the authorized person can have access to the database. Different members have limited access to the database according to their jobs. This is also the important factor for database security as it can prevent the leak of any information from the database.

Many large organizations have had their database system hacked and customer data stolen. There are many organizations and MNC’s have had their database system hacked by the hackers. Adobe, eBay and LinkedIn are major companies whose database security mechanism was hacked in this century. In this, we will be discussing about the company DataViper whose database system was hacked and lots of records and confidential information was offered on the sale. DataViper is itself a cybersecurity and breach database company but due to glitch in their security mechanism it was hacked by the hackers.

The security for the database be different than security for the rest of the system. As the database is the backbone of any organization and it should be kept fully secure and secret. Different schemas and subschemas should be designed that can made accessible to the different users of the database. Database administrator has the access to overall management of the database. There are other users like system analyst, end users of the database, developers and programmers all should have access to the database according to their requirements.

The login credential can be provided to the different users of the database so that they can access only the required portion of the database. This can prevent the any leak of information and security breaches by any attacker or any known person of the organization. In this way the database security is different from the rest of the system and it should be considered as important as the security of the rest of the system.

Keeping database security separate from the rest of the system makes the difference for web-based security designs as database security is considered as the important factor and more focus is given on preventing database security mechanism. That’s why the database security is important in any organization for their proper growth and progress.


Related Solutions

Many organizations have quite a large amount of data, but often do not have the tools...
Many organizations have quite a large amount of data, but often do not have the tools to analyze these data. Also keep in mind that data are not just numbers but the data can come in other forms. How do we analyze all of these data that a business has? That is the role of analytics in business.
SQL DATABASE Task 2 [10.5 marks] using the AdditionCollege database For task 2, we have provided...
SQL DATABASE Task 2 [10.5 marks] using the AdditionCollege database For task 2, we have provided you with the creation script for the AdditionCollege database. Run this script in MySQL Workbench to create the database. You should execute your query solutions to extract the necessary information. The script is based on the following schematic: Unit (Unit_code, Staff_id, [UnitName]) Staff (Staff_id, StaffName, Position, Gender) Taught_by (Unit_code, Staff_id, weekday) Student (Student_id, Student_name, Address, Gender) TuteGroup (TuteGroup_code, Unit_code, DayHrCode, Room_Nr) TuteGroup_List (TuteGroup_code, Student_id)...
Many medium and large organizations have an internal audit function. This is a requirement for companies...
Many medium and large organizations have an internal audit function. This is a requirement for companies listed on some stock exchanges and for banks and other financial institutions with major fiduciary responsibilities. Other companies have an internal audit function because it is considered to be a valuable element. Should firms have an Internal Audit function? Provide the main reasons for your opinion.
Why do many organizations have data that cannot be converted to actionable information? What are the...
Why do many organizations have data that cannot be converted to actionable information? What are the hurdles faced by firms that attempt to query transactional databases?
Why do many organizations have data that cannot be converted to actionable information? What are the...
Why do many organizations have data that cannot be converted to actionable information? What are the hurdles faced by firms that attempt to query transactional databases?
Address the following in your response: What experiences have you had as a customer in the...
Address the following in your response: What experiences have you had as a customer in the twenty-first century. What was positive or negative about the experience? Were your needs as a customer met? Why or why not? Describe an experience with each of these: Call center Customer service over the internet (chat) Social media
Your database contains a role called nurse and many users who have that role. One of...
Your database contains a role called nurse and many users who have that role. One of the users in the system is jackie. You need to write statements to implement the following privileges: All nurses should have read access to the shifts table; Jackie happens to be a nurse, but also has administrative duties and should be able to update, insert, and delete from the shifts table. Write SQL that accomplishes this
“Marriott International announced in November 2018 that attackers had stolen data on approximately 500 million customers....
“Marriott International announced in November 2018 that attackers had stolen data on approximately 500 million customers. The breach initially occurred on systems supporting Starwood hotel brands starting in 2014. The attackers remained in the system after Marriott acquired Starwood in 2016 and were not discovered until September 2018.”(sourced from a published report) Referring to the case given, list and explain 2 steps that can help prevent data breach like this.
“Marriott International announced in November 2018 that attackers had stolen data on approximately 500 million customers....
“Marriott International announced in November 2018 that attackers had stolen data on approximately 500 million customers. The breach initially occurred on systems supporting Starwood hotel brands starting in 2014. The attackers remained in the system after Marriott acquired Starwood in 2016 and were not discovered until September 2018.”(sourced from a published report) Referring to the case given, list and explain 2 steps that can help prevent data breach like this.
Python using sqllite3 package In this exercise, your task is to inspect the given database, which...
Python using sqllite3 package In this exercise, your task is to inspect the given database, which is called 'chinook.db', as you can see from the testing code below in the example. We first would like to know how the logical schema of the database looks like, in order to work with it later in terms of reading from and writing to the database. Please also note that a software tool like "DB Browser for SQLite" can be used to inspect...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT