Project identification and business environment

Assignment Help Basic Computer Science
Reference no: EM131092855

Applied research project report submission.

TOPIC: DATABASE SECURITY AND HOW IT SHOULD BE APPLIED IN AMAZON OPERATING SYSTEM ENVIRONMENT.

Part 1: Project Identification and Business Environment

Address the following topics as they apply to your policy:

  1. Establish authorities and responsibilities for database security management.
  2. Develop operational and incident management procedures when security breaches are discovered.
  3. Define personnel and procedures for daily administration and maintenance of security policies.

Part 2: Architecture and Operating System Considerations

Address the following topics as they apply to your policy:

  1. Define the architecture for your system. Does it use client server, web, or application servers? Given the architecture, elaborate on what methods will be used in your database to support this architecture. Consider the following elements in the formulation of your policy:
    • Integration of DBMS security with client applications and operating systems
    • Integration of DBMS security with network operations
    • Integration of DBMS security with server operating systems
    • Integration of DBMS security with web servers and application servers
  2. Define requirements as they relate to database security. This includes, but is not limited to: connection pooling, proxies, application roles, file permissions, privileged accounts, password requirements, and other methods appropriate to your selection.

Part 3: User Accounts and Password Administration

Address the following topics as they apply to your policy:

  1. User administration
  2. Password policies
  3. Profile definitions and assignments. What is the criterion for assignment of a profile to an account?

Part 4: Privileges and Roles

Address the following topics as they apply to your policy.

  1. Security model selection
  2. Roles, including privileged roles assignment and administration and role policies
  3. System privileges
  4. Object privileges

Part 5: Database Security Operations

Address the following topics as they apply to your policy

  1. Requirements and methodology for database logging
  2. Requirements and methodology for activity auditing

Part 6: Data Isolation Policies

Address the following topics as they apply to your policy:

  1. Requirements for data isolation
  2. Database views
  3. Database triggers
  4. Database stored procedures

Part 7: Physical Environment for Secured Databases

Address the following topics as they apply to your policy:

  1. Use of physical security and control mechanisms systems
  2. Database backup and restore practices relating to security

Part 8: Conclusion, Summary, and References

  1. Develop a summary and conclusion for your paper
  2. Cite your references

Reference no: EM131092855

Questions Cloud

Determine the specified properties : For each of the following cases, determine the specified properties and show the states on a sketch of the T-u diagram.
State null hypotheses for the researchers test : State the null and alternative hypotheses for the researchers test - explain in the context of this scenario the meaning of Type I and Type II errors.
Demo availability and the latest version : Research two more alternatives for CASE tools. Include cost, demo availability and the latest version. Be sure to include your references.
Why it is important to consider different risk measures : Why it is important to consider different risk measures? Which risk measures would you consider in the analysis of your own portfolio given your preferences as an investor? How many stocks. Based on the article linked above.
Project identification and business environment : Establish authorities and responsibilities for database security management. Develop operational and incident management procedures when security breaches are discovered.
Choosing a particular layout : Please name at least two other layouts and describe what type of information you would put on those particular slides. What is your deciding factor when choosing a particular layout?
Review on global geopolitics : There is no doubt that global geopolitics has affected the way of life of millions of people in the world today. Some countries have had their rights and freedom suppressed whereas others have had their dreams cut off
A short note advertisement and Basic accounting assumptions : A short note Advertisement in one page  and Basic accounting assumptions or concepts
Redundancy and data independence play : 1. Differentiate the role that data redundancy and data independence play in the database management system concept. Is either of these concepts desirable for a database? Explain your decision for choosing the concept that is desirable.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Which of the following deals with transitive dependencies

Which of the following deals with transitive dependencies in normalization?

  Why it is necessary to choose appropriate data types

Why it is necessary to choose appropriate data types for each data column. How must a database designer balance the time to complete data modeling steps with the benefits the data modeling process offers in creating

  Create a program with the following specifications

Create a program with the following specifications: Reserve space in memory for an array of words of size 10. Use the '.space' directive. The array is called my array.

  Implement the function swap

Implement the function swap, as described in Checkpoint Question 3, but remove the assumption that the i th and jth items on the list exist. Return a value that indicates whether the swap was successful.

  Is it still necessary to wait one rtt before data is sent

Show that it is also possible for each switch to choose the VCI value for the outbound link, and that the same VCI values will be chosen by each approach. If each switch chooses the outbound VCI, is it still necessary to wait one RTT before data i..

  What are the two principles of protocol layering

Define the three types of data flow. What are the two principles of Protocol Layering?

  What would be shared among those processes

What would be shared among those processes?

  How many atm packets will it take to carry the ack

How many ATM packets will it take to carry the ACK? What if AAL3/4 is used instead?

  Design a half adder circuit using only nand gates

Convert 0010001010000110 (BCD) into its binary equivalent and then divide it by 100102. Express your result in octal equivalent.

  The iso network management model helps it managers

The ISO Network Management Model helps IT managers

  Design a flowchart or pseudocode for a program

Chocolate Delights Candy Company manufactures several types of candy.  Design a flowchart or pseudocode for a program that accepts a candy name (for example, "chocolate-covered blueberries"), price per pound, and number of pounds sold in the average ..

  Create a power point slide show

Choose an historical event, short story, speech, or other document, create a power point slide show from the document. The slide show has a title slide that displays your name and the title of your slide show, table of contents slide that provides..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd