What do you meant by database security

Assignment Help Management Information Sys
Reference no: EM1325301

Analysis of Database Security

Scenario: ABC company is a small, but growing manufacturing company with revenues of approximately $25 million. Until now, the company has had a single headquarters and production facility in a Midwestern city, but it is building a separate sales office on the east coast which will open in a few months.

You are the Manager of IT at ABC, and you have been responsible for operating a basic set of computer applications in the Midwest office: order entry and fulfillment, financial and accounting systems, e-mail, and general office automation (word processing, etc.) You have been maintaining a Local Area Network connecting the office desktop computers to each other and to the applications running on the company servers, but there has been no access to these systems from outside the office.

You have been told by senior management that when the new sales office opens, the east coast staff must be able to enter new orders directly into the home office system using their desktop computers. They also need access to customer records and order status information. Furthermore, management wants to implement a new company website for customers to place orders online and to view their ordering history, current order status, and financial statement information without calling customer service.

You realize there are huge security implications implied by these changes. You have been uneasy in the past because the company has lacked a comprehensive computer security policy. Furthermore, most employees have not really understood all the security issues in the old "internal" computing environment. The new configuration with its networked offices and Internet-accessible elements will require more security awareness than ever. You see this as your opportunity, and imperative, to move the company to accept a formal corporate security standard. In the weeks ahead, you will begin to educate both management and system users regarding the components, necessity, and use of security standards for all of the new technologies that will be used, as well as for the current technology they have been using. In the end, you will develop all of this together into a complete corporate security program proposal.

Task Details: ABC Manufacturing has a number of internal databases which are of particular importance to the business. Some of these databases detail the company's manufacturing processes and formulae, including the unique ways to control manufacturing costs. These processes and formulae are particularly sensitive in this industry because ABC produces low-margin commodity products with little price flexibility. Some other databases have customer-specific sales contract information. Senior management recognizes that this mission critical information must be protected from loss and from unauthorized disclosure in order to preserve the company's competitive edge.

You need to explain the following to senior management:

What is meant by Database Security?
What are the essential considerations in Database Security?
How are they specifically relevant to ABC's planned computing environment?

Reference no: EM1325301

Questions Cloud

Characterize the company''s personnel as its human asset : Why do we characterize the company's personnel as its human asset? Explain and exemplify.
Reaons of econcomic recovery and collapse : What is one of the single most important factors to judge whether a country is recovering from the global economic recession?
Discuss the civil remedies : Explain what the civil remedies are in the examples above, including why civil remedies may be used to combat criminal acts. Also, provide additional examples.
Environmental regulation in two east asian countries : Your firm has been investigating the possibility of locating facilities in East Asian country such as Thailand, Malaysia, Taiwan, or Singapore. Explain the level of environmental regulation in any 2 of these countries. Explain the 2 selected countr..
What do you meant by database security : What is meant by Database Security and What are the essential considerations in Database Security and How are they specifically relevant to ABC's planned computing environment?
What is time estimate : How does an estimator arrive at a time estimate for a particular task.
Explain the origins of the tort liabiliy : Should both civil and criminal court cases be proven in the same manner? In other words, should either preponderance of evidence and beyond reasonable doubt be abolished and/or replaced with one standard of proof? Why?
Explain about business and society : Explain about Business and Society and believe shape the relationship between business and society
Briefly explain the difference mesh, bus, ring, and star top : Briefly explain the difference, including advantages and disadvantages Ethernet, Token Ring, FDDI, and Wireless.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain a technology innovation

This post addresses health technology issues - Explain a technology innovation that can change/ease an inefficient visit at a medical facility experienced by you or a family member

  Gap analysys - system development life cycle

Gap analysys - How might gap analysis be applied to the system development life cycle?

  Supply chains and system dynamics

This solution shows how feedback and the absence of feedback creates the bull-whip effect. The feedback that is the most useful in order to determine weekly orders for Kentucky Swamp Brew is discussed, along with how and when to obtain such inform..

  Company goals and aspirations

What kind of secondary information and data can be used to make informed decision that would obviate the need to testing

  Explain how to maintain database integrity

How to maintain Database Integrity - Explain how database integrity can be maintained

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Explain the duties of a network manager

Duties of a Network Manager - This solution describes the duties of a network manager, and also explains the implications of regulation on electronic documents.

  Discuss your business success metrics

IT Success Metrics - compare and discuss your business success metrics

  Explain potential problem with new technology

Parker Earth Moving: Potential Problem with new Technology - Relevant to the situation facing the company is the fact that the Information Technology Department exists in name only. The department is understaffed and the department manager is ill-t..

  Show the threat of open source software

Comment on open source software - How is Microsoft and other software manufacturers combating the threat of open source software and other free tools that compete

  Applications for businesses and individual users

Location Based Application, SDLC, Powerpoint and What are the benefits and drawbacks of location-based applications for businesses and individual users?

  Efficiency of your sales force via technology

Utilizing technology - enhance the functionality and efficiency of your sales force via technology.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd