Explore BrainMass
Share

Database Security

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

If you want to create users with different levels of access and capabilities to manipulate the database within an organization, what issues must you keep in mind, based on your reading and knowledge of creating users and roles thus far? Why is user security important to organizations? Discuss database security from a variety of perspectives. Describe how you would manage security and permissions within a database using roles.

Share experiences have you had in terms of user security in past jobs or as a student? Do you feel the user security was effective in those situations? What would you have done differently in light of what you've learned about data security?

Be sure to cite your sources.

© BrainMass Inc. brainmass.com October 16, 2018, 6:28 pm ad1c9bdddf
https://brainmass.com/computer-science/error-detection-correction/database-security-86303

Solution Preview

Database security [1] is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be the result of internal misuse, malicious external attacks or inadvertent internal mistakes.

Issues
----------
Fundamentally, to set an effective approach to authorization the first question that you need to address is "what will we control access to?" An experience [2] is that you can secure access to both data and functionality, such as access to quarterly sales figures and the ability to fire another employee respectively. Your stakeholder's requirements will drive the answer to this question. However, the granularity of access, and your ability to implement it effectively, is a significant constraint. For example, although you may be asked to control access to specific columns of specific rows within a database based on complex business rules you may not be able to implement this in a cost effective manner that also conforms to performance constraints.

The second question that you need to answer is "what rules are applicable?" The answer to this question is also driven by your stakeholder's requirements, although you may need to explore ...

$2.19
Similar Posting

SQL Database Security

See attached file.

Details: Congratulations! You are one of the world's finest security professionals. Throughout the next few weeks, you will be living the life of travel, tight deadlines, and vague projects.

Your deliverables will require the highest level of professionalism. All of your deliverables should be presented as if your customers are paying you $225 per hour plus expenses plus per diem.

Part of being a professional requires that you cite your sources. For the purposes of this exercise, you will be using the APA style.

Your area of specialty is application security. You are one of the best in the world at handling security issues in C/C++ .net and Java.

You have been asked to partner with a number of other security consultants to help a large customer secure its databases. The customer wants the following information from your team:

How would we secure a Microsoft SQL Server?

Be sure to cite all references in APA format.

View Full Posting Details