Verify your implementation by viewing the data dictionary

Assignment Help Database Management System
Reference no: EM13753482

Part -1:

Case: Oracle Security

You are hired as a database administrator for a small reseller company to implement and administer the database component of their main application.The data model of this application is presented inFigure 4-20. The schema owner is called DBSEC.

a. Use the scripts provided to create a schema.

b. Create three different profiles based on the criteria listed in Table 4-7.

Table 4-7 Profile configuration requirements

Profile 

Resources

Password

DBSEC_ADMIN_PROF

SESSIONS_PER_USER = 5
CONNECT_TIME = 8 hours
IDLE_TIME = 1 hour

PASSWORD_LIFE_TIME = 1 month
PASSWORD_GRACE_TIME = 7 days 

DBSEC_DEVELOPER_PROF

CONNECT_TIME = 12 hours
IDLE_TIME = 2 hours
CPU_PER_CALL = 1 minute

PASSWORD_LIFE_TIME = 1 month
PASSWORD_GRACE_TIME = 14 days

DBSEC_DEVELOPER_PROF

SESSIONS_PER_USER = 1 
CPU_PER_CALL = 5 seconds
CONNECT_TIME = 8 hours
IDLE_TIME = 30 minutes 
LOGICAL_READS_PER_CALL = 10 KB 

FAILED_LOGIN_ATTEMPTS = 1
PASSWORD_LIFE_TIME = 1 month
PASSWORD_LOCK_TIME = 3 days
PASSWORD_GRACE_TIME = 14 days

c. Create four different roles that have privileges according to the specification outlined inTable 4-8.

Table 4-8 Roles and privileges configuration requirements

Role Name

Privileges

DBSEC_ADMIN_ROLE

SELECT and ALTER on all DBSEC tables

DBSEC_CLERK_ROLE

SELECT,INSERT,and UPDATE on all DBSEC tables

DBSEC_SUPERVISOR_ROLE

SELECT,INSERT,UPDATE,and DELETE on all DBSEC tables

DBSEC_QUERY_ROLE

SELECT on all DBSEC tables

d. After creating these profiles and roles,create users according to the specifications in Table 4-9.

User Name

Role

Profile

DBSEC_ADMIN

DBSEC_ADMIN_ROLE

DBSEC_ADMIN_PROF

DBSEC_CLERK

DBSEC_CLERK_ROLE

DBSEC_CLERK_PROF

DBSEC_SUPER

DBSEC_SUPERVISOR_ROLE

DBSEC_CLERK_PROF

DBSEC_QUERY1

DBSEC_QUERY_ROLE

DBSEC_CLERK_PROF

DBSEC_QUERY2

DBSEC_QUERY_ROLE

DBSEC_CLERK_PROF

DBSEC_DEVELOPER

DBSEC_ADMIN_ROLE + DBSEC_SUPERVISOR_ROLE

DBSEC_DEVELOPER_PROF

e. Verify your implementation by viewing the data dictionary.

Case SQL Server Security

You are the DBA for Acme Corporation.You're asked to implement a new database server usingMicrosoft SQL Server.In any implementation,security needs to be a theme woven throughouttheproject,not an afterthought. Design an implementation that allows you to implement policies. The design should also include a role-based security structure. The business requirements for the database are as follows:

  • No user should have delete access to any object.
  • Human Resources needs to be able to fully manage employee data.
  • Customer Service needs to be able to make changes to existing customers and vieworder data.
  • Customer account managers need to be able to fully manage customer data and orders.
  • Sales needs to be able to view customer data and fully manage orders.
  • Marketing needs to able to pull quarterly sales numbers to analyze.

Follow these steps to produce a solution:

1. Install SQL Server using the Windows Integrated security mode.

2. Use a Window user for the service accounts.

3. Demote built-in\administrators to security and create a DBA windows group for systemadministrators.

4. Set up password policies based on best practices.

a. Use a minimum of eight characters

b. Use complex passwords

c. Set account lock-out for after three tries

d. Keep five passwords in history

e. Expire passwords after 30 days

5. Set up the roles listed in Tables 4-10 through 4-14.

Table 4-10 Human_Resources

Table

Select

Insert

Update

Delete

Employees

X

Table 4-11 Customer_Service

Table

Select

Insert

Update

Delete

Customers

 

X

Orders

 

 

X

Order Details

 

 

X

Table 4-12 Account_Managers

Table

Select

Insert

Update

Delete

Customers

X

Orders

X

Orders Details

X

Table 4-13 Sales

Table

Select

Insert

Update

Delete

Customers

 

 

X

Orders

 

 

 

X

Order Details 

 

 

 

X

Table 4-14 Marketing

Table

Select

Insert

Update

Delete

Territory

 

 

X

Orders

 

 

X

Order Details

 

 

X

Part -2:

1 Case 5-1 Secure Your Application with SQL Server IAcme Manufacturing is implementing a new Web-based ordering system for preferred customers and Pats an internal client/server application so Acme sales people can manage the orders. Implement the authorization table using any two suitable application models presented in this chapter.

Role Permissions

clerk select, update, and insert on all tables

super clerk and delete

admin super and all permissions on the authentication table

Case: Application Security with Oracle

You were hired by Acme Telecommunication Systems (ATM to implement a number of security
rain requirements. Provide the architecture of the application security model you select and the steps to
implement it. The application has the following modules:
• Account maintenance
• Call records
• Transactions
• Call monitoring
• Backup and restore
• Security
The following ATS users will be accessing the system:
• Sammy Bright
• Tom Lord
• Linda Glass
• loan Knight
• James Howell
• Dennis Wright
• Ray Stevenson
• Phil Magnet
• Kate Davis

ATS requested the following security implementation: Roles
Role Rank
Service 0
Operator 1
Supervisor 2
Administrator 3
CEO 4
Privileges
Privilege Rank
query 0
update 1
delete 2
grant 3

Module-Role

 

 

 

 

 

Module

Service

Operator

Supervisor

Administrator

CEO

Account maintenance

query

update

delete

grant

query

Call records

 

update

delete

grant

query

Transactions

 

update

delete

grant

query

Call monitoring Backup and restore

delete

query

query

grant
grant

query

Security

 

query

 

grant

query

User-Role

 

 

 

 

 

User

Service

Operator

Supervisor

Administrator

CEO

Sammy Bright

X

 

X

 

 

Toni Lord

X

X

 

 

 

Linda Glass

 

 

 

X

 

Joan Knight

X

X

X

 

 

James Howell

X

 

 

 

 

Dennis Wright

 

 

X

 

 

Ray Stevenson

 

X

 

 

 

Phil Magnet

 

X

 

 

 

Kate Davis

 

 

 

 

X

Reference no: EM13753482

Questions Cloud

Future performance of the firm : Valuation of a firm's financial assets is said to be based on what is expected in the future, in terms of the future performance of the firm, the industry, and the economy.
The federal long-term tax-exempt rate : Through a “Type B” reorganization, Golden Corporation acquired 90% of Retriever Co stock by October 2 of the current tax year ending December 31. At the time the 90% was acquired, Retriever Co was worth $800,000 and the Federal long-term tax-exempt r..
Develop an application that allows the input and updating : Develop an application that allows the input, updating, and deletion of customers, homes, salespersons, and sales from your Reston Real Estate (RRE) Oracle database FA14-CMIS440-485 that you have been using since Project #2
Prepare general journal entries : Merry land's had inventory balance $32 570 at close of accounting period. the following sales & purchases are for current period. Prepare general journal entries (ignoring GST) assuming: 1. a periodic inventory system is used 2. a perpetual inventory..
Verify your implementation by viewing the data dictionary : Implement the authorization table using any two suitable application models presented - Use the scripts provided to create a schema - Create three different profiles based on the criteria.
Company more than just periodic interest payments : Assume that a company issues a bond at 92 having a face value of $5,000 and a coupon interest rate of 6%. The bond pays interest annually and has a five-year-maturity time frame, and bonds of similar risk are currently paying interest rates of 8%.
Identify five different it systems : Identify five different IT systems that have affected business in the past few years (i.e., business software applications, networks, hardware, internet-based technologies, databases)
Legal definition of the crime : What is the legal definition of the crime of obtaining goods by false pretenses?  Do the facts in the case satisfy the definition?  Explain.
Distributive share of the partnership passive taxable income : Where on the tax return is the following reported? Distribution of $4800 from ST Partnership. Her distributive share of the partnership passive taxable income was $5300. She had no prior passive losses.

Reviews

Write a Review

Database Management System Questions & Answers

  Knowledge and data warehousing

Design a dimensional model for analysing Purchases for Adventure Works Cycles and implement it as cubes using SQL Server Analysis Services. The AdventureWorks OLTP sample database is the data source for you BI analysis.

  Design a database schema

Design a Database schema

  Entity-relationship diagram

Create an entity-relationship diagram and design accompanying table layout using sound relational modeling practices and concepts.

  Implement a database of courses and students for a school

Implement a database of courses and students for a school.

  Prepare the e-r diagram for the movie database

Energy in the home, personal energy use and home energy efficiency and Efficient use of ‘waste' heat and renewable heat sources

  Design relation schemas for the entire database

Design relation schemas for the entire database.

  Prepare the relational schema for database

Prepare the relational schema for database

  Data modeling and normalization

Data Modeling and Normalization

  Use cases perform a requirements analysis for the case study

Use Cases Perform a requirements analysis for the Case Study

  Knowledge and data warehousing

Knowledge and Data Warehousing

  Stack and queue data structure

Identify and explain the differences between a stack and a queue data structure

  Practice on topic of normalization

Practice on topic of Normalization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd