Share
Explore BrainMass

SQL Database Security

See attached file.

Details: Congratulations! You are one of the world's finest security professionals. Throughout the next few weeks, you will be living the life of travel, tight deadlines, and vague projects.

Your deliverables will require the highest level of professionalism. All of your deliverables should be presented as if your customers are paying you $225 per hour plus expenses plus per diem.

Part of being a professional requires that you cite your sources. For the purposes of this exercise, you will be using the APA style.

Your area of specialty is application security. You are one of the best in the world at handling security issues in C/C++ .net and Java.

You have been asked to partner with a number of other security consultants to help a large customer secure its databases. The customer wants the following information from your team:

How would we secure a Microsoft SQL Server?

Be sure to cite all references in APA format.

Attachments

Solution Preview

Details: Congratulations! You are one of the world's finest security professionals. Throughout the next few weeks, you will be living the life of travel, tight deadlines, and vague projects.

Your deliverables will require the highest level of professionalism. All of your deliverables should be presented as if your customers are paying you $225 per hour plus expenses plus per diem.

Part of being a professional requires that you cite your sources. For the purposes of this exercise, you will be using the APA style.

Your area of specialty is application security. You are one of the best in the world at handling security issues in C/C++ .net and Java.

You have been asked to partner with a number of other security consultants to help a large customer secure its databases. The customer wants the following information from your team:

How would we secure a Microsoft SQL Server?

Be sure to cite all references in APA format.

Microsoft gives ten steps to securing an SQL server. These steps are installing the most recent service pack, accessing the server's security with Microsoft Baseline Security Analyzer, and using Windows authenticating mode. These are the first three steps prescribed by Microsoft. The other steps are isolating the server and backing it up regularly, assigning a strong system's administrator password, limiting the privilege of SQL Services, disabling the SQL Server port on the firewall, and using the most secure file system. The last two steps suggested by Microsoft are to delete or secure old setup files and to audit connections to SQL server (Microsoft Corporaton2009),.

Essentially there are four areas that need to be secured ...

Solution Summary

This explanation provides you a comprehensive argument relating to SQL Database Security

$2.19