Explore BrainMass

Securing Databases

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

Why is data security important now more than ever? What are some of the steps that we can take to ensure that our database is protected and secure? How can you use user views to enhance security and restrict access?

© BrainMass Inc. brainmass.com October 25, 2018, 7:34 am ad1c9bdddf

Solution Preview

Protecting your data means protecting your business. Data security breach from within or from outside intruders, whether overt or covert, will result in a devalued business confidence for a company's data.

The integrity of the database that is not secure is questionable. An establishment, for example the office of registry that electronically records that births, marriages and deaths in a locality, encountered illegal data intrusion. Users of their data may be wary that the database may have been populated with data that are spurious and bogus.

The best way is to hire trusted personnel that will manage the database system. Password protection must be installed on every workstation.

All system passwords must be changed periodically.

Further, firewall and anti-virus applications must be installed to protect the system.

One of the leading anti-virus solutions provider McAfee (n.d.) suggested these steps to protect databases:

Step 1: Identify known content ...

Solution Summary

The solution deals on protecting data and databases. It emphasizes that the best way to secure databases is to employ personnel that put a high premium on loyalty and trust.

See Also This Related BrainMass Solution

Database Security

If you want to create users with different levels of access and capabilities to manipulate the database within an organization, what issues must you keep in mind, based on your reading and knowledge of creating users and roles thus far? Why is user security important to organizations? Discuss database security from a variety of perspectives. Describe how you would manage security and permissions within a database using roles.

Share experiences have you had in terms of user security in past jobs or as a student? Do you feel the user security was effective in those situations? What would you have done differently in light of what you've learned about data security?

Be sure to cite your sources.

View Full Posting Details