Question

In: Computer Science

After reading the required resources for this module and reviewing the database you just designed for...

After reading the required resources for this module and reviewing the database you just designed for your final project, think about what security considerations should be taken with the design. Write these considerations in the form of a database design security checklist that includes your top six to eight security implications for the database design. A security assessment checklist is a common practice in the industry and proves to a CIO or IT auditor that you are following best practices in securing a database. It also serves as a living document to assist you in your design process. For example, on the networking side of IT, Cisco provides this checklist for small and medium business to evaluate their network infrastructure. You will use the information from this website to assist you in creating your own checklist.

Solutions

Expert Solution

Following is the checklist for database security design :

1. Physical Access Control

  • No one should be able to enter the facility without identity or authorization.
  • This is the first step in protecting the data and the staff against malicious intrusions and attacks.
  • Various security controls such as internal keys, keycodes, badge numbers or badges can be used.
  • This makes an observation, copying or stealing of data.

2. Installation And Configuration Security

  • Always a custom installation should be carried out and no software that is not required must be installed. Any option which is not required is to be unchecked during the installation. If an irregular installation is followed, the options not required must be removed later.
  • The default user passwords must be changed along with those for administrative users after installation. A very strong password management must be enforced.
  • The practice of least privilege least privilege should be followed along with enabling data dictionary protection.
  • Unnecessary privileges must be revoked and permissions on runtime facilities must be restricted.
  • Access control must be enforced effectively along with restricting operating system access and network access.

3. Self Security

  • Personal security is a critical factor of the total database security. The staff must be well aware of the security concerns and consideration security concerns and consideration.
  • Proper selection, interviews comma observation and reference checking for background verification must be done before hiring the people for a database center.
  • Security is highly dependent on the personnel and bridges can happen when they become careless, or vengeful against the organization.
  • The staff must be given basic information security training to avoid online attacks and breaches on to their systems.

4. Networking Security

  • Secure SSL communication and https must be used along with a Firewall. This must be consistent for both ends of every communication related to the database.
  • The client encryption cipher suites must be supported by the server along with the key algorithm and its certificates in use.
  • A certificate authentication for clients and servers must be set along with configuring the connections to use SSL.
  • Privileges of background listeners must be reduced so that cannot read or write in the database. This can be done by protecting the listener with a password, preventing online administration and removing any and all external processor configuration.
  • Listening to, interfering with and creating Communications with the network must be restricted. Network access points must be protected against unauthorized access.
  • Also, encryption should be used to encrypt the data while transferring it over the internet along with the use of firewalls.
  • The firewall should be well maintained and there should not be any loopholes.
  • The host operating system must be hardened by disabling all unnecessary operating system services. Also, communication quotes for the disabled services must be closed.

Related Solutions

After reading the required resources for this module and reviewing the database you just designed for...
After reading the required resources for this module and reviewing the database you just designed for your final project, think about what security considerations should be taken with the design. Write these considerations in the form of a database design security checklist that includes your top six to eight security implications for the database design. A security assessment checklist is a common practice in the industry and proves to a CIO or IT auditor that you are following best practices...
After reviewing the resources provided for you in this module, research and report on the current...
After reviewing the resources provided for you in this module, research and report on the current rate of unemployment in your city and state and compare those rates to the national rate. With that information, write a two- to three-page paper and answer the following questions : What do the rates tell you? What are the different measurements of unemployment and what factors affect them? If you have ever been unemployed, or know someone who has been unemployed, which measurement...
Credit and Insurance Instructions After reading the required resources, answer the following questions: What steps could...
Credit and Insurance Instructions After reading the required resources, answer the following questions: What steps could you take to improve your credit worthiness? (Chapter 15) Some businesses sell products and services that can injure customers. List three (3) examples and explain how these companies probably use their insurance. (Chapter 16) Word count requirement: A minimum of 100 words is required for this discussion. Book: Entrepreneurship and Small Business Management, 1/e Vitalsource eBook for Florida Technical College Author: Steve Mariotti Car
After reading Appendix 5A and reviewing the online videos, you should have a good understanding of...
After reading Appendix 5A and reviewing the online videos, you should have a good understanding of the various tools management accountants might use to create a cost formula for a mixed cost (both variable and fixed components). The three methods outlined in Appendix 5A are the scattergraph method, the high-low method, and the method of least squares (regression). For this discussion, I'd like you to tell me which method you think is most practical for use in "the real world"...
After reviewing the concepts of utilitarianism and universalism in this unit’s reading, discuss which of these...
After reviewing the concepts of utilitarianism and universalism in this unit’s reading, discuss which of these principles you think is most often applied in business. Explain your reasoning by providing examples to support your thought process.
Review all the materials discussed in this and the preceding module. After reading the information and...
Review all the materials discussed in this and the preceding module. After reading the information and guidelines, discuss why nutrition and weight status are important for health. Post one reference you used for the evidence-based information you are discussing. Please make an initial post by midweek, and respond to at least two other student's posts with substantial details that demonstrate an understanding of the concepts and critical thinking. Also, add an additional point to complement their post. Remember that your...
Review all the materials discussed in this and the preceding module. After reading the information and...
Review all the materials discussed in this and the preceding module. After reading the information and guidelines, discuss why nutrition and weight status are important for health. Post one reference you used for the evidence-based information you are discussing. Please make an initial post by midweek, and respond to at least two other student's posts with substantial details that demonstrate an understanding of the concepts and critical thinking. Also, add an additional point to complement their post. Remember that your...
After reading the texts and mini-lectures in this module write a paper that completes the tasks...
After reading the texts and mini-lectures in this module write a paper that completes the tasks below. Read the following excerpts as if these characters were clients that you work with. Write an example of the skills as if you were therapist/counselor. You may copy the excerpts and format (below) and paste into your own Word document to complete and submit. EXCERPT 1 I have no place to turn. I am always alone ..I mean I have a lot of...
AskMD is a popular medical app. After reading the information presented in this module and other...
AskMD is a popular medical app. After reading the information presented in this module and other sources, write a one-page paper that summarizes some of the features of this app. What are three other examples of medical apps for iOS and Android devices?
Sony Marketing After reading Chapter 7 on Demand Forecasting in a Supply Chain and reviewing the...
Sony Marketing After reading Chapter 7 on Demand Forecasting in a Supply Chain and reviewing the case study, Sony Marketing (Japan) Inc., discuss your views on the role that demand forecasting plays in Sony's supply chain strategy. Tell us the factors that make a demand forecasting strategy necessary, and how Sony is able to be more responsive to its customers due to this SCM strategy. Compare and contrast your posting with theirs. How did their posts influence your thinking? What...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT