Database backup and restore practices relating to security

Assignment Help Database Management System
Reference no: EM13891377

Objective

Through this real-world project you will design a secure, scalable, and responsive database security plan and requirements definition document for a system of your choice. Your chief security officer has given you the assignment of defining, developing, and documenting a database security policy and plan for your databases. This document shall define who is responsible for security in your organization and what authority is granted to that person in the advent of a security breach. Additionally, policies and procedures should be defined and documented that outline the daily administrative tasks, definition of security rules and methods, and the enforcement of those rules. Your job is not to implement the requirements but to define what the requirements are and to document them. While working on your project, assume the roles of the chief security officer, database designer, database administrator, and chief applications designer.

Part 1: Project Identification and Business Environment --

Address the following topics as they apply to your policy:

Establish authorities and responsibilities for database security management.

Develop operational and incident management procedures when security breaches are discovered.

Define personnel and procedures for daily administration and maintenance of security policies.

Part 2: Architecture and Operating System Considerations --

Address the following topics as they apply to your policy:

Define the architecture for your system. Does it use client server, web, or application servers? Given the architecture, elaborate on what

methods will be used in your database to support this architecture. Consider the following elements in the formulation of your policy:

Integration of DBMS security with client applications and operating systems

Integration of DBMS security with network operations

Integration of DBMS security with server operating systems

Integration of DBMS security with web servers and application servers

Define requirements as they relate to database security. This includes, but is not limited to: connection pooling, proxies, application

roles, file permissions, privileged accounts, password requirements, and other methods appropriate to your selection.

Part 3: User Accounts and Password Administration --

Address the following topics as they apply to your policy:

User administration

Password policies

Profile definitions and assignments. What is the criterion for assignment of a profile to an account?

Part 4: Privileges and Roles --

Address the following topics as they apply to your policy.

Security model selection

Roles, including privileged roles assignment and administration and role policies

System privileges

Object privileges

Part 5: Database Security Operations --

Address the following topics as they apply to your policy

Requirements and methodology for database logging

Requirements and methodology for activity auditing

Part 6: Data Isolation Policies --

Address the following topics as they apply to your policy:

Requirements for data isolation

Database views

Database triggers

Database stored procedures

Part 7: Physical Environment for Secured Databases --

Address the following topics as they apply to your policy:

Use of physical security and control mechanisms systems

Database backup and restore practices relating to security

Part 8: Conclusion, Summary, and References --

Develop a summary and conclusion for your paper

Cite your references

Reference no: EM13891377

Questions Cloud

Explain career development as integral subset of human : While considering the article by Farkas, (see attached) use three conclusions from the research that inform a potential career counselor about possible causes for the educational achievement gap.
Describe the different types of corporate diversification : Describe in theory different types of corporate diversification. What diversification type best characterizes Peach Computers in 2001 and why?
What was the intent of your design : Design Synthesis - What was the intent of your design o Design Representation and Discuss the different preliminary ideas and illustrate each preliminary design. Discuss final design concept and discuss how they fulfill each criteria
Assignment on business intelligence and data warehouses : Assignment on  Business Intelligence and Data Warehouses
Database backup and restore practices relating to security : Database backup and restore practices relating to security
How does developmental lifespan perspective influence career : How does the developmental lifespan perspective influence career and educational planning, placement, and evaluation?
Budgeting structure at the federal level : How have the struggles and changes in politics affected the budgeting structure at the federal level? What do the changes at the national level mean for the state and local levels? Provide examples with special emphasis on the impact at state leve..
What are the signs and symptoms of a heart attack : Explain the flow of blood through the chambers of the heart and to the lungs. What are the signs and symptoms of a heart attack? Explain the roles and differences between the three blood vessels arteries, veins, and capillaries. Explain norm..
Perform proper analyses to identify demographic factors : What is the lifestyle of each of the possible target markets, and what are the implications of this finding for the advertising message that would "speak" to this market segment when the hybrid model is introduced

Reviews

Write a Review

Database Management System Questions & Answers

  Implicit cursor to print out the mid of manager of bob

Write an anonymous PL/SQL program to compute the sum of 1, 3, 5, 7, 9. You must use a loop -  implicit cursor to print out the MID of manager of Bob.

  Describe two database features new to oracle database

This writing assignment calls for you to provide a substantive response 1400 words on the subject of managing databases. Describe two database features new to Oracle Database 12c that you've encountered so far in the class

  What is the role of the project manager

Discuss why many information technology professionals may overlook project cost managment and how this might affect completing projects within budget.

  Explain how you would formulate an sql injection attack

Explain how you would formulate an SQL injection attack against an e-Commerce server such as Amazon

  Search for a record based on a particular field value

For each of the following queries, which of the listed index choices would you choose to speed up the query? If your database system does not consider index-only plans (i.e., data records are always retrieved even if enough information is available i..

  How can you find the minimal key of relational schema

How can you find the minimal key of relational schema? What do you understand by dependency preservation?

  Design an expanded entity relationship model diagram

You are to design an Expanded Entity Relationship Model Diagram. An example of the Expanded Entity Relationship Model Diagram is seen in Figure 3.27 on page 89.

  Transform the table into one or more tables in bcnf

Transform this table into one or more tables in BCNF. State the primary keys, candidate keys, foreign keys, and referential integrity constraints.

  Object-oriented client database assignment

Imagine that a customer has come to your team and has requested a simple application that will allow the customer to store client names, addresses, and telephone numbers. The application will be written as a console app

  Complete information about eci employees

Your goal is to develop a database that shall allow ECI to keep track of its business and provide the management with the following information regarding the performance of the business: HR Management. Complete information about ECI employees, espe..

  What are the candidate keys of r

Suppose you have a relation schema about teaching classes that has the following attributes: Class, Instructor, Time and Room.

  How you can use six sigma

Introduction to Six Sigma Understanding Six Sigma History of Six Sigma Six Sigma Methodologies & Tools Roles & Responsibilities. How YOU can use Six Sigma?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd