Question

In: Computer Science

After reading the required resources for this module and reviewing the database you just designed for...

After reading the required resources for this module and reviewing the database you just designed for your final project, think about what security considerations should be taken with the design. Write these considerations in the form of a database design security checklist that includes your top six to eight security implications for the database design.

A security assessment checklist is a common practice in the industry and proves to a CIO or IT auditor that you are following best practices in securing a database. It also serves as a living document to assist you in your design process. For example, on the networking side of IT, Cisco provides this checklist for small and medium business to evaluate their network infrastructure. You will use the information from this website to assist you in creating your own checklist.

For this discussion, you will develop something similar, but for databases. Post your checklist to the discussion forum. You will not see your peers’ initial posts until you have posted your own checklist.

Upon reviewing your classmates’ checklists, provide substantive responses to at least two of your classmates on their checklist. Your responses should include items such as whether their checklist will manage risk appropriately and whether the checklist will maintain the databases’ confidentiality, integrity, and availability.

Solutions

Expert Solution

The database design security list is as follows:

1) During database design we should make sure that only database views are exposed to the application. we mean to say applicaion should interact with database through views rather than interating with tables. So we need to use database views instead of tables

2) Write store procedures which includes all the logic and make store procedures secure.

3)Make sure to implement various authentication policies in database design. Various read write privileges should be well defined.

4)We can also encrypt our database completely to make it more secure .

5) Database users should also be defined with proper privileges.


Related Solutions

After reading the required resources for this module and reviewing the database you just designed for...
After reading the required resources for this module and reviewing the database you just designed for your final project, think about what security considerations should be taken with the design. Write these considerations in the form of a database design security checklist that includes your top six to eight security implications for the database design. A security assessment checklist is a common practice in the industry and proves to a CIO or IT auditor that you are following best practices...
After reviewing the resources provided for you in this module, research and report on the current...
After reviewing the resources provided for you in this module, research and report on the current rate of unemployment in your city and state and compare those rates to the national rate. With that information, write a two- to three-page paper and answer the following questions : What do the rates tell you? What are the different measurements of unemployment and what factors affect them? If you have ever been unemployed, or know someone who has been unemployed, which measurement...
After reviewing the resources for this module, discuss the power of clustering and association models. Give...
After reviewing the resources for this module, discuss the power of clustering and association models. Give an example of a company that collects or uses data for various reasons. How can clustering or association models help the company complete the sentence "You might also be interested in
Credit and Insurance Instructions After reading the required resources, answer the following questions: What steps could...
Credit and Insurance Instructions After reading the required resources, answer the following questions: What steps could you take to improve your credit worthiness? (Chapter 15) Some businesses sell products and services that can injure customers. List three (3) examples and explain how these companies probably use their insurance. (Chapter 16) Word count requirement: A minimum of 100 words is required for this discussion. Book: Entrepreneurship and Small Business Management, 1/e Vitalsource eBook for Florida Technical College Author: Steve Mariotti Car
After reading Appendix 5A and reviewing the online videos, you should have a good understanding of...
After reading Appendix 5A and reviewing the online videos, you should have a good understanding of the various tools management accountants might use to create a cost formula for a mixed cost (both variable and fixed components). The three methods outlined in Appendix 5A are the scattergraph method, the high-low method, and the method of least squares (regression). For this discussion, I'd like you to tell me which method you think is most practical for use in "the real world"...
After reviewing the concepts of utilitarianism and universalism in this unit’s reading, discuss which of these...
After reviewing the concepts of utilitarianism and universalism in this unit’s reading, discuss which of these principles you think is most often applied in business. Explain your reasoning by providing examples to support your thought process.
Review all the materials discussed in this and the preceding module. After reading the information and...
Review all the materials discussed in this and the preceding module. After reading the information and guidelines, discuss why nutrition and weight status are important for health. Post one reference you used for the evidence-based information you are discussing. Please make an initial post by midweek, and respond to at least two other student's posts with substantial details that demonstrate an understanding of the concepts and critical thinking. Also, add an additional point to complement their post. Remember that your...
Review all the materials discussed in this and the preceding module. After reading the information and...
Review all the materials discussed in this and the preceding module. After reading the information and guidelines, discuss why nutrition and weight status are important for health. Post one reference you used for the evidence-based information you are discussing. Please make an initial post by midweek, and respond to at least two other student's posts with substantial details that demonstrate an understanding of the concepts and critical thinking. Also, add an additional point to complement their post. Remember that your...
After reading the texts and mini-lectures in this module write a paper that completes the tasks...
After reading the texts and mini-lectures in this module write a paper that completes the tasks below. Read the following excerpts as if these characters were clients that you work with. Write an example of the skills as if you were therapist/counselor. You may copy the excerpts and format (below) and paste into your own Word document to complete and submit. EXCERPT 1 I have no place to turn. I am always alone ..I mean I have a lot of...
AskMD is a popular medical app. After reading the information presented in this module and other...
AskMD is a popular medical app. After reading the information presented in this module and other sources, write a one-page paper that summarizes some of the features of this app. What are three other examples of medical apps for iOS and Android devices?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT