What security tools should be added to minimize risk

Assignment Help Database Management System
Reference no: EM131289740

This final assignment is the logical continuation of assignment #1.

In assignment #1, you researched your organization or school to determine its database architecture, and you designed an Assessment and Analysis plan (Phase 1 of the Security Architecture Cycle) for your organization. In particular, you had to:

- Identify the assets to be protected
- Define and prioritize the threats against those assets

In this final assignment, you are asked to (partially) implement Phase 2 of the Security Architecture Cycle ("Design and Modeling", described on page 25 of the textbook). Armed with the knowledge you acquired during this term, you should be able to write policies and to prototype a security architecture that fit the needs of the business (or school) you selected in assignment #1.

In particular, you should address:

- What security policies need to be put into place in order to mitigate the identified threats? Security Policies are addressed on page 27. Some additional guidelines and examples are given below.

- What firmware/software changes need to take place to minimize vulnerabilities and support policies?

Given the database management system used in your selected environment and given the policy requirements, what changes in software version/configuration must be done?

- What security tools or applications should be added to minimize risk?

You are asked to include the description of the environment, the identified assets and threats from assignment #1 in the final assignment. Please feel free to make some "guesses" about the described environment.

Your final submission should be professional-looking. The expected length is between 6 to15 pages.

Guidelines for writing the policy:

- A security policy describes what it means for an organization to be secure. It is an agreed upon document that executive management uses to communicate its security goals and objectives. Thus, the language should be appropriate for all employees.
- The goal of such a policy is generally to protect valuable and/or confidential information from unauthorized access, but also to limit legal liability and prevent waste or inappropriate use of organization resources. Phrases such as "must", "should", or "will" are used to establish baseline expectations for behavior by employees and to authorize audits and monitoring.
- A security policy typically includes:
o Scope (1 paragraph)
o Goals (1 paragraph)
o Information classification (1-2 paragraphs)
o Actual requirements: as an itemized list. Specifically, database policy statements could address:
- Roles and responsibilities: Roles at the organization level could include application developer, database user, database administrator, database owner, application owner etc. Responsibilities should be designated.
- Database access types
- Authentication and authorization - a password policy should be defined or referenced
- Use of encryption (files, data in transit, backup files), managing encryption keys
- Backups and recovery (weekend or weekdays, on-line or off-line, incremental or full, etc.)
- Audits (auditor, frequency of audits, what is audited)
- Use of multi level security
- Use virtual private databases
- Database servers hardening (firewall/intrusion detection system, secure configuration, patch management, vulnerability assessment)
- Change management (ensure privileged accounts are documented, administered, monitored, and reviewed)
o Reference to supporting documents (existing procedures and guidelines)
o Reference to regulatory compliance (if any)
o Consequences for non-compliance of the security policy (1 - 2 paragraphs)

The following are sample security policies that could help you develop your database security policy:
- server security policy

(https://www.sans.org/security-resources/policies/server-security/pdf/server-security-policy ) ,
- Mobile Employee Endpoint Responsibility Policy

(https://www.sans.org/security-resources/policies/retired/pdf/mobile-employee-endpoint-responsibility-policy )

Verified Expert

In the given document there are few question related to to the given case study. To solve these problem we should have proper knowledge of it.And we have also discussed about database optimization.

Reference no: EM131289740

Questions Cloud

Research about the judicial process and judge : Research about the Judicial Process and Judge .research a judge who is currently serving on the courts in your state or local area.
Fdic insured savings account : (a) If the family own no other assets than this house, what is the expected value of their asset? (b) If the family had $25,000 sitting in a FDIC insured savings account, what would the expected value of their assets be? (c) If this family was of..
Discuss the argument from all sides of given issue : Is it fair to single out specific products for restrictions such as New York City's proposed size cap on soft drinks? Discuss this argument from all sides of this issue: government, soft drink marketers, and consumers.
How many pounds of salt will there be in the tank : Salt water containing 1.92 lb/gal of salt flows at a fixed rate of 2 gal/min into a 100-gal tank, initially filled with fresh water. The density of the incoming solution is 71.8 lb/ft3. The solution, kept uniform by stirring, flows out at a fixed r..
What security tools should be added to minimize risk : Identify the assets to be protected and define and prioritize the threats against those assets - determine its database architecture, and you designed an Assessment and Analysis plan (Phase 1 of the Security Architecture Cycle) for your organizatio..
Diminishing returns sets in from your marginal costs : a) "Your average fixed costs should stay constant even if your output increases." b) "To reduce my variable costs I must let go of one of my managers with whom I signed a contract for two years." c) "To calculate my total costs, I only have ..
Find the mass flow rate and maximum velocity : Two very long parallel plates of length 2L are separated a distance b. The upper plate moves downward at a constant rate V. A fluid fills the space between the plates
Who is the intended audience : A summary of the article Summarize the main points which the author discusses.Identify the main argument.c. This summary should provide background for the analysis.
Why a business desire fewer customers over more customers : When implementing customer relationship management, why might a business desire fewer customers over more customers?

Reviews

inf1289740

12/12/2016 7:56:17 AM

PLEASE DO THIS WELL AND INTRESTING I need details for assignment 1" & "One more thing please ask student to provide mentioned page number of their book."

Write a Review

Database Management System Questions & Answers

  Create an access database that keeping track of employees

Create an Access database called EMPLOYEES that will aid you in keeping track of your employees. You can decide field names but be sure to include at least eight fields, including one called TOTALPAY.

  Write a check constraint that expresses

Write a CHECK constraint that expresses

  Design database in microsoft access

Access will draw a line, called_______a, between matching fields in two tables, indicating that the tables are related. You can then select fields from either table. Access joins the tables automatically.

  What is the difference between constructor and method

What is the purpose of default constructor - What is the difference between constructor and method

  Create queries and explain the purpose of query in detail

Create Queries and explain the purpose of each query in detail.

  Relational algebragiven the following set of relations from

relational algebragiven the following set of relations from the east coast aquarium database list the sequence of

  Identify classes described in the preceding scenario

Develop a list of attributes for each class. Place the attributes onto the CRC cards - Identify the classes described in the preceding scenario (you should find six). Create CRC cards for each class.

  Information-gathering techniques for the project

Explain the information-gathering techniques and design methods you would suggest to use for project. Recognize the key factors that help ensure the information required for the project.

  Create a database design

Create a database design (schema) based on the following problem description.

  Differences between data integrity and data consistency

Compare and contrast the differences between data integrity and data consistency and provide example for each one.

  Cover topic of usability in the field of interface design

Use the Internet to locate two articles that cover the topic of universal usability in the field of interface design. Be prepared to discuss.

  Design and build a small database application

In Word, identify a potential database application. It should be based on data you understand well, such as student data (refer to text), a hobby (see Lesson 8), or a set of data you use on the job. When you have made your choice, proceed to Step ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd