Question

In: Computer Science

Database Design and Management Question: Discuss the security needs of DBMS solution. Recommend a comprehensive but...

Database Design and Management Question: Discuss the security needs of DBMS solution. Recommend a comprehensive but high-level security management plan for the design.

Solutions

Expert Solution

Security contemplations don't just apply to the information held in a database. Ruptures of security may influence different parts of the framework, which may thus influence the database. Subsequently, database security incorporates equipment, programming, individuals, and information. To viably execute security requires fitting controls, which are characterized in particular mission destinations for the framework. This requirement for security, while frequently having been ignored or disregarded before, is presently progressively perceived by associations. The explanation behind this pivot is because of the expanding measures of critical corporate information being put away on PC and the acknowledgment that any misfortune or inaccessibility of this information could be conceivably lamentable.

Security management plan for the databaedesign:-

Authorization

Approval is the giving of a privilege or benefit that empowers a subject to have honest to goodness access to a framework or a framework's protest. Approval controls can be incorporated with the product, and administer not just what database framework or question a predefined client can get to, additionally what the client may do with it. The procedure of approval includes validation of a subject asking for access to a question, where "subject" speaks to a client or program and "protest" speaks to a database table, see, method, trigger, or whatever other question that can be made inside the database framework.

Views

A view is a virtual table that does not really exist in the database but rather can be created upon demand by a specific client, at the season of demand. The view system gives a capable and adaptable security instrument by concealing parts of the database from specific clients. The client doesn't know about the presence of any segments or columns that are absent from the view. A view can be characterized more than a few tables with a client being allowed the suitable benefit to utilize it, yet not to utilize the base tables. Along these lines, utilizing a view is more prohibitive than basically having certain benefits conceded to a client on the base table(s).

Backup and recovery

Reinforcement is the procedure of occasionally taking a duplicate of the database and log document (and perhaps programs) onto disconnected capacity media. A DBMS ought to give reinforcement offices to help with the recuperation of a database taking after disappointment. To monitor database exchanges, the DBMS keeps up an uncommon document called a log record (or diary) that contains data about all updates to the database. It is constantly fitting to make reinforcement duplicates of the database and log document at standard interims and to guarantee that the duplicates are in a protected area. In case of a disappointment that renders the database unusable, the reinforcement duplicate and the points of interest caught in the log record are utilized to reestablish the database to the most recent conceivable steady state. Journaling is the way toward keeping and keeping up a log record (or diary) of all progressions made to the database to empower recuperation to be attempted adequately in case of a disappointment.

Integrity constraints

Add to keeping up a protected database framework by keeping information from getting to be distinctly invalid, and subsequently giving deluding or off base outcomes.

Encryption

Is the encoding of the information by an exceptional calculation that renders the information indistinguishable by any program without the decoding key. On the off chance that a database framework holds especially delicate information, it might be esteemed important to encode it as a safety measure against conceivable outside dangers or endeavors to get to it. Some DBMSs give an encryption office to this reason. The DBMS can get to the information (in the wake of deciphering it), despite the fact that there is debasement in execution in light of the time taken to interpret it. Encryption likewise secures information transmitted over correspondence lines. There are various strategies for encoding information to cover the data; some are named irreversible and others reversible. Irreversible procedures, as the name infers, don't allow the first information to be known. In any case, the information can be utilized to get legitimate factual data. Reversible procedures are all the more regularly utilized. To transmit information safely over shaky systems requires the utilization of a cryptosystem, which incorporates:

•             an encryption key to encode the information (plaintext);

•             an encryption calculation that, with the encryption key, changes the plain content into ciphertext;

•             a decoding key to unscramble the ciphertext;

•             a decoding calculation that, with the unscrambling key, changes the ciphertext once more into plain content.

Redundant Array of Independent Disks (RAID)

Assault works by having an expansive circle exhibit including a game plan of a few free plates that are composed to enhance unwavering quality and in the meantime increment execution. The equipment that the DBMS is running on must be blame tolerant, implying that the DBMS ought to keep on operating regardless of the possibility that one of the equipment parts comes up short. This recommends having repetitive segments that can be consistently coordinated into the working framework at whatever point there is at least one part disappointments. The primary equipment segments that ought to be blame tolerant incorporate plate drives, circle controllers, CPU, control supplies, and cooling fans. Plate drives are the most helpless segments with the briefest circumstances between disappointments of any of the equipment parts.

One arrangement is the utilization of Redundant Array of Independent Disks (RAID) innovation. Attack works by having a huge circle exhibit containing a course of action of a few autonomous plates that are sorted out to enhance unwavering quality and in the meantime increment execution.

Thank you.


Related Solutions

What is the Database Management System (DBMS)? Give example companies who are using DBMS in Saudi...
What is the Database Management System (DBMS)? Give example companies who are using DBMS in Saudi Arabia? (write max 200 words with evidence in your own words)
Q1: Explain the different database structures in database management system (DBMS) Q2: What are the roles...
Q1: Explain the different database structures in database management system (DBMS) Q2: What are the roles of OSI layers to transmit data from one computer to another computer?
Explain the advantages of using Database Management System (DBMS) [10 marks]
Explain the advantages of using Database Management System (DBMS) [10 marks]
Discuss the disadvantages of a distributed database management system (DDBMS), in terms of “Security”.
Discuss the disadvantages of a distributed database management system (DDBMS), in terms of “Security”.
Database Management Question: Choose a database recovery problem and then propose a solution using the techniques,...
Database Management Question: Choose a database recovery problem and then propose a solution using the techniques, such as log-based recovery or shadow paging, etc. Briefly describe the technique, when it is appropriate to use, and what recovery problem it solves.
A general-purpose database management system (DBMS) has 5 basic responsibilities: Interaction with the file management system...
A general-purpose database management system (DBMS) has 5 basic responsibilities: Interaction with the file management system Integrity enforcement Security enforcement Backup and Recovery Concurrency control For each responsibility, explain the problems that would arise if the DBMS did not execute these responsibilities. Be descriptive and give examples where appropriate.
Database Design - Recovery Choose a database recovery problem and then propose a solution using the...
Database Design - Recovery Choose a database recovery problem and then propose a solution using the techniques such as Log-based recovery, shallow paging, etc. Briefly describe the technique, when it is appropriate to use and what recovery problem it solves.
1. Advantages and disadvantages of Web-DBMS approach. Discuss the Web as a database platform 2. Compare...
1. Advantages and disadvantages of Web-DBMS approach. Discuss the Web as a database platform 2. Compare and contrast ER model and DM. 3. Describe the database design methodology for DW 4. Compare and contrast OLAP and OLTP
Using appropriate literature, properly discuss a specific security threat, and recommend appropriate solution(s). The topic discussion...
Using appropriate literature, properly discuss a specific security threat, and recommend appropriate solution(s). The topic discussion should include at least the following: ▪ Explanation of the security threat. ▪ Impact of the security threat. ▪ Recommended solution ___________________________________________ I choose the topic is : ( computer viruses ) I NEED ONLY THE FITST POINT IS Explanation of the security threat + make sure include distinction between viruses and other typed of malware.
design a relational database to cater for the needs of the new bookshop owner as described...
design a relational database to cater for the needs of the new bookshop owner as described in the first question giving examples of tables, attributes, primary and foreign keys. you may assume that suppliers' orders contain more than one line
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT