Question

In: Computer Science

Write these considerations in the form of a database design security checklist that includes your top...

Write these considerations in the form of a database design security checklist that includes your top six to eight security implications for the database design. A security assessment checklist is a common practice in the industry and proves to a CIO or IT auditor that you are following best practices in securing a database. It also serves as a living document to assist you in your design process. For example, on the networking side of IT, Cisco provides this checklist: https://www.cisco.com/c/en/us/solutions/small-business/resource-center/secure-my-business/network-security-checklist.html for small and medium business to evaluate their network infrastructure. You will use the information from this website to assist you in creating your own checklist.

Solutions

Expert Solution

Following is the checklist for database security design :

1. PHYSICAL ACCESS CONTROL

  • No one should be able to enter the facility without identity or authorisation.
  • This is the first step in protecting the data and the staff against malicious intrusions and attacks.
  • This makes observation, copying or stealing of data.
  • Various security controls such as internal keys, keycodes, badge numbers or badges can be used.

2. SELF SECURITY

  • Personal security is a critical factor of the total database security. The staff must be must be well aware of the security concerns and consideration security concerns and consideration.
  • Proper selection, interviews comma observation and reference checking for background verification must be done before hiring the people for a database centre.
  • Security is highly dependent on the personnel and bridges can happen when they become careless, or vengeful against the organisation.
  • The staff must be given basic information security training to avoid online attacks and breaches on to their systems.

3. INSTALLATION AND CONFIGURATION SECURITY

  • Always a custom installation should be carried out and no software that is not required must be installed installed. Any option which is not required is to be unchecked during the installation. If irregular installation is followed, the options not required must be removed later.
  • The default user passwords must must be changed along with those for administrative users after installation. A very strong password management must be enforced.
  • The practice of least privilege privilege least privilege should be followed along with enabling data dictionary protection.
  • Unnecessary privileges must be revoked and permissions on runtime facilities must be restricted.
  • Access control must be enforced effectively along with restricting operating system access and network access.

4. NETWORKING SECURITY

  • Secure SSL communication and https must be used along with a Firewall. This must be consistent for both ends of every communication related to the database.
  • The client encryption cypher suites must be supported by the server along with the key algorithm and its certificates in use.
  • A certificate authentication for clients and servers must be set along with configuring the connections to use SSL.
  • Privileges of background listeners must be reduced so that cannot read or write in the database. This can be done by protecting the listener with a password, preventing online administration and removing any and all external processor configuration.
  • Listening to to, interfering with and creating Communications with the network must be restricted. Network access points must be protected against unauthorised access.
  • Also encryption should be used to encrypt the data while transferring it over the internet along with use of firewalls.
  • The firewall should be well maintained and there should not be any loopholes.
  • The host operating system must be hardened by disabling all unnecessary operating system services. Also communication quotes for the disabled services must be closed.

Related Solutions

Your task is to write a procedure or checklist of things that are required to prepare...
Your task is to write a procedure or checklist of things that are required to prepare financial forecasts and projections of an organisation. Please ensure you include the following in your procedure/checklist: Timetable preparation Identifying assumptions and parameters Issuing instructions for preparation of forecasts and projections Collecting and analysing data Documentation of results Approval protocols You will be required to provide the procedure and checklist to the assessor.
Database Design and Management Question: Discuss the security needs of DBMS solution. Recommend a comprehensive but...
Database Design and Management Question: Discuss the security needs of DBMS solution. Recommend a comprehensive but high-level security management plan for the design.
It is a database security assignment - Your team is in charge of writing a formal...
It is a database security assignment - Your team is in charge of writing a formal company policy to keep the company database assets secure.
Need answers for Normalization, Physical Design, Sql, And Security exam. 1. The database you're creating will...
Need answers for Normalization, Physical Design, Sql, And Security exam. 1. The database you're creating will be installed on a group of three servers. What feature of an enterprise RDBMS will allow one server to pick up the processing work if the main server becomes nonoperational? A. Failover B. Business intelligence C. Data warehouse D. Load balancing 2. What type of clause must you always use with DELETE or UPDATE to avoid inadvertently changing data elsewhere in the database? A....
When evaluating a savings plan, name your top three of the important considerations outlined in the...
When evaluating a savings plan, name your top three of the important considerations outlined in the text. Briefly explain why each of these are important when you are considering your savings options.
using empirical research checklist search for empirical article and write an annotation concise summary in your...
using empirical research checklist search for empirical article and write an annotation concise summary in your own words and APA format (1) Does breastfeeding help to reduce the risk of childhood obesity (2) a systematic review and meta-analysis of the effect of lifestyle modification on metabolic control in overweight children?
Write a post in which you explain at least three ways that database design and data...
Write a post in which you explain at least three ways that database design and data architecture can work together to improve patient satisfaction, lower care costs, or improve patient outcomes. Then identify at least two areas of uncertainty or unanswered questions that you have about database design and data architecture.
Describe a simple database of your choice or design, along with the table/s representing the data,...
Describe a simple database of your choice or design, along with the table/s representing the data, and illustrate the Insertion Anomaly through the real data or records there. Your database should be different from those already covered in the lectures or practicals.
Design and implement a relational database application of your choice using MS Workbench on MySQL a)...
Design and implement a relational database application of your choice using MS Workbench on MySQL a) Declare two relations (tables) using the SQL DDL. To each relation name, add the last 4 digits of your Student-ID. Each relation (table) should have at least 4 attributes. Insert data to both relations (tables); (15%) b) Based on your expected use of the database, choose some of the attributes of each relation as your primary keys (indexes). To each Primary Key name, add...
Write a SQL script to add another table to your database. Include these fields in your...
Write a SQL script to add another table to your database. Include these fields in your Product table: Field Name Description Data Type Sample Value ProductID Product ID integer 5 ProductName Product Name varchar(50) candle Description Product Description varchar(255) Bee’s wax candle picUrl Filename of the product’s picture varchar(50) candle.gif Price Product Price decimal 10.99           ProductID should be the Primary Key. It is an auto-increment field.           The Price field stores prices to 7 significant digits and to 2...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT