If you want to create users with different levels of access and capabilities to manipulate the database within an organization, what issues must you keep in mind, based on your reading and knowledge of creating users and roles thus far? Why is user security important to organizations? Discuss database security from a variety of perspectives. Describe how you would manage security and permissions within a database using roles.
Be sure to cite your sources.© BrainMass Inc. brainmass.com October 16, 2018, 6:28 pm ad1c9bdddf
Database security  is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be the result of internal misuse, malicious external attacks or inadvertent internal mistakes.
Fundamentally, to set an effective approach to authorization the first question that you need to address is "what will we control access to?" An experience  is that you can secure access to both data and functionality, such as access to quarterly sales figures and the ability to fire another employee respectively. Your stakeholder's requirements will drive the answer to this question. However, the granularity of access, and your ability to implement it effectively, is a significant constraint. For example, although you may be asked to control access to specific columns of specific rows within a database based on complex business rules you may not be able to implement this in a cost effective manner that also conforms to performance constraints.
The second question that you need to answer is "what rules are applicable?" The answer to this question is also driven by your stakeholder's requirements, although you may need to explore ...
SQL Database Security
See attached file.
Details: Congratulations! You are one of the world's finest security professionals. Throughout the next few weeks, you will be living the life of travel, tight deadlines, and vague projects.
Your deliverables will require the highest level of professionalism. All of your deliverables should be presented as if your customers are paying you $225 per hour plus expenses plus per diem.
Part of being a professional requires that you cite your sources. For the purposes of this exercise, you will be using the APA style.
Your area of specialty is application security. You are one of the best in the world at handling security issues in C/C++ .net and Java.
You have been asked to partner with a number of other security consultants to help a large customer secure its databases. The customer wants the following information from your team:
How would we secure a Microsoft SQL Server?
Be sure to cite all references in APA format.View Full Posting Details