Reference no: EM13753482
Part -1:
Case: Oracle Security
You are hired as a database administrator for a small reseller company to implement and administer the database component of their main application.The data model of this application is presented inFigure 4-20. The schema owner is called DBSEC.
a. Use the scripts provided to create a schema.
b. Create three different profiles based on the criteria listed in Table 4-7.
Table 4-7 Profile configuration requirements
Profile
|
Resources
|
Password
|
DBSEC_ADMIN_PROF
|
SESSIONS_PER_USER = 5 CONNECT_TIME = 8 hours IDLE_TIME = 1 hour
|
PASSWORD_LIFE_TIME = 1 month PASSWORD_GRACE_TIME = 7 days
|
DBSEC_DEVELOPER_PROF
|
CONNECT_TIME = 12 hours IDLE_TIME = 2 hours CPU_PER_CALL = 1 minute
|
PASSWORD_LIFE_TIME = 1 month PASSWORD_GRACE_TIME = 14 days
|
DBSEC_DEVELOPER_PROF
|
SESSIONS_PER_USER = 1 CPU_PER_CALL = 5 seconds CONNECT_TIME = 8 hours IDLE_TIME = 30 minutes LOGICAL_READS_PER_CALL = 10 KB
|
FAILED_LOGIN_ATTEMPTS = 1 PASSWORD_LIFE_TIME = 1 month PASSWORD_LOCK_TIME = 3 days PASSWORD_GRACE_TIME = 14 days
|
c. Create four different roles that have privileges according to the specification outlined inTable 4-8.
Table 4-8 Roles and privileges configuration requirements
Role Name
|
Privileges
|
DBSEC_ADMIN_ROLE
|
SELECT and ALTER on all DBSEC tables
|
DBSEC_CLERK_ROLE
|
SELECT,INSERT,and UPDATE on all DBSEC tables
|
DBSEC_SUPERVISOR_ROLE
|
SELECT,INSERT,UPDATE,and DELETE on all DBSEC tables
|
DBSEC_QUERY_ROLE
|
SELECT on all DBSEC tables
|
d. After creating these profiles and roles,create users according to the specifications in Table 4-9.
User Name
|
Role
|
Profile
|
DBSEC_ADMIN
|
DBSEC_ADMIN_ROLE
|
DBSEC_ADMIN_PROF
|
DBSEC_CLERK
|
DBSEC_CLERK_ROLE
|
DBSEC_CLERK_PROF
|
DBSEC_SUPER
|
DBSEC_SUPERVISOR_ROLE
|
DBSEC_CLERK_PROF
|
DBSEC_QUERY1
|
DBSEC_QUERY_ROLE
|
DBSEC_CLERK_PROF
|
DBSEC_QUERY2
|
DBSEC_QUERY_ROLE
|
DBSEC_CLERK_PROF
|
DBSEC_DEVELOPER
|
DBSEC_ADMIN_ROLE + DBSEC_SUPERVISOR_ROLE
|
DBSEC_DEVELOPER_PROF
|
e. Verify your implementation by viewing the data dictionary.
Case SQL Server Security
You are the DBA for Acme Corporation.You're asked to implement a new database server usingMicrosoft SQL Server.In any implementation,security needs to be a theme woven throughouttheproject,not an afterthought. Design an implementation that allows you to implement policies. The design should also include a role-based security structure. The business requirements for the database are as follows:
- No user should have delete access to any object.
- Human Resources needs to be able to fully manage employee data.
- Customer Service needs to be able to make changes to existing customers and vieworder data.
- Customer account managers need to be able to fully manage customer data and orders.
- Sales needs to be able to view customer data and fully manage orders.
- Marketing needs to able to pull quarterly sales numbers to analyze.
Follow these steps to produce a solution:
1. Install SQL Server using the Windows Integrated security mode.
2. Use a Window user for the service accounts.
3. Demote built-in\administrators to security and create a DBA windows group for systemadministrators.
4. Set up password policies based on best practices.
a. Use a minimum of eight characters
b. Use complex passwords
c. Set account lock-out for after three tries
d. Keep five passwords in history
e. Expire passwords after 30 days
5. Set up the roles listed in Tables 4-10 through 4-14.
Table 4-10 Human_Resources
Table
|
Select
|
Insert
|
Update
|
Delete
|
Employees
|
√
|
√
|
√
|
X
|
Table 4-11 Customer_Service
Table
|
Select
|
Insert
|
Update
|
Delete
|
Customers
|
√
|
|
√
|
X
|
Orders
|
√
|
|
|
X
|
Order Details
|
√
|
|
|
X
|
Table 4-12 Account_Managers
Table
|
Select
|
Insert
|
Update
|
Delete
|
Customers
|
√
|
√
|
√
|
X
|
Orders
|
√
|
√
|
√
|
X
|
Orders Details
|
√
|
√
|
√
|
X
|
Table 4-13 Sales
Table
|
Select
|
Insert
|
Update
|
Delete
|
Customers
|
√
|
|
|
X
|
Orders
|
√
|
√
|
√
|
X
|
Order Details
|
√
|
√
|
√
|
X
|
Table 4-14 Marketing
Table
|
Select
|
Insert
|
Update
|
Delete
|
Territory
|
√
|
|
|
X
|
Orders
|
√
|
|
|
X
|
Order Details
|
√
|
|
|
X
|
Part -2:
1 Case 5-1 Secure Your Application with SQL Server IAcme Manufacturing is implementing a new Web-based ordering system for preferred customers and Pats an internal client/server application so Acme sales people can manage the orders. Implement the authorization table using any two suitable application models presented in this chapter.
Role Permissions
clerk select, update, and insert on all tables
super clerk and delete
admin super and all permissions on the authentication table
Case: Application Security with Oracle
You were hired by Acme Telecommunication Systems (ATM to implement a number of security
rain requirements. Provide the architecture of the application security model you select and the steps to
implement it. The application has the following modules:
• Account maintenance
• Call records
• Transactions
• Call monitoring
• Backup and restore
• Security
The following ATS users will be accessing the system:
• Sammy Bright
• Tom Lord
• Linda Glass
• loan Knight
• James Howell
• Dennis Wright
• Ray Stevenson
• Phil Magnet
• Kate Davis
ATS requested the following security implementation: Roles
Role Rank
Service 0
Operator 1
Supervisor 2
Administrator 3
CEO 4
Privileges
Privilege Rank
query 0
update 1
delete 2
grant 3
Module-Role
|
|
|
|
|
|
Module
|
Service
|
Operator
|
Supervisor
|
Administrator
|
CEO
|
Account maintenance
|
query
|
update
|
delete
|
grant
|
query
|
Call records
|
|
update
|
delete
|
grant
|
query
|
Transactions
|
|
update
|
delete
|
grant
|
query
|
Call monitoring Backup and restore
|
delete
|
query
|
query
|
grant grant
|
query
|
Security
|
|
query
|
|
grant
|
query
|
User-Role
|
|
|
|
|
|
User
|
Service
|
Operator
|
Supervisor
|
Administrator
|
CEO
|
Sammy Bright
|
X
|
|
X
|
|
|
Toni Lord
|
X
|
X
|
|
|
|
Linda Glass
|
|
|
|
X
|
|
Joan Knight
|
X
|
X
|
X
|
|
|
James Howell
|
X
|
|
|
|
|
Dennis Wright
|
|
|
X
|
|
|
Ray Stevenson
|
|
X
|
|
|
|
Phil Magnet
|
|
X
|
|
|
|
Kate Davis
|
|
|
|
|
X
|
Future performance of the firm
: Valuation of a firm's financial assets is said to be based on what is expected in the future, in terms of the future performance of the firm, the industry, and the economy.
|
The federal long-term tax-exempt rate
: Through a “Type B” reorganization, Golden Corporation acquired 90% of Retriever Co stock by October 2 of the current tax year ending December 31. At the time the 90% was acquired, Retriever Co was worth $800,000 and the Federal long-term tax-exempt r..
|
Develop an application that allows the input and updating
: Develop an application that allows the input, updating, and deletion of customers, homes, salespersons, and sales from your Reston Real Estate (RRE) Oracle database FA14-CMIS440-485 that you have been using since Project #2
|
Prepare general journal entries
: Merry land's had inventory balance $32 570 at close of accounting period. the following sales & purchases are for current period. Prepare general journal entries (ignoring GST) assuming: 1. a periodic inventory system is used 2. a perpetual inventory..
|
Verify your implementation by viewing the data dictionary
: Implement the authorization table using any two suitable application models presented - Use the scripts provided to create a schema - Create three different profiles based on the criteria.
|
Company more than just periodic interest payments
: Assume that a company issues a bond at 92 having a face value of $5,000 and a coupon interest rate of 6%. The bond pays interest annually and has a five-year-maturity time frame, and bonds of similar risk are currently paying interest rates of 8%.
|
Identify five different it systems
: Identify five different IT systems that have affected business in the past few years (i.e., business software applications, networks, hardware, internet-based technologies, databases)
|
Legal definition of the crime
: What is the legal definition of the crime of obtaining goods by false pretenses? Do the facts in the case satisfy the definition? Explain.
|
Distributive share of the partnership passive taxable income
: Where on the tax return is the following reported? Distribution of $4800 from ST Partnership. Her distributive share of the partnership passive taxable income was $5300. She had no prior passive losses.
|