Computer Science
CBFS Database Security Measures & SQL Audit Trigger Discussions

College of Banking and Financial Studies

Question Description

I’m stuck on a Computer Science question and need an explanation.

(Code: A95/ date29/6/2020)

******

Which subject:

Database security

If there is any program to use :use SQL in Task 2

Calculations or thury:

Thury

How many words:2000

*********

Turniti report needed Similarity less than5% .

All the requirements in attach file .

CBFS Database Security Measures & SQL Audit Trigger Discussions
whatsapp_image_2020_06_29_at_1.18.42_am.jpeg
CBFS Database Security Measures & SQL Audit Trigger Discussions
image_2020_06_29_at_1.18.42_am.jpeg

Unformatted Attachment Preview

Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer

please receive this document for the answers

ASSIGNMENT NAME

Database Security

MODULE NAME

SESSION

STUDENT NAME

STUDENT ID

FACULTY NAME

Table of Contents
Task 1 ........................................................................................................................................................ 3
a)

Impact of losing data privacy in database security ....................................................................... 3

b)

Security Measures for database privacy........................................................................................ 4

Task 2 ........................................................................................................................................................ 5
a)

Security vulnerabilities ................................................................................................................. 5

b)

Updating the profile ...................................................................................................................... 6

Task 3 ........................................................................................................................................................ 7
SQL audit trigger command .................................................................................................................. 7
Task 4 ........................................................................................................................................................ 8
a)

Plan for effective backup management ......................................................................................... 8

b)

Backup restoration testing plan ..................................................................................................... 9

References .............................................................................................................................................. 11

2

Task 1
a) Impact of losing data privacy in database security
Data privacy refers to how information or data is handled depending on the purpose it is intended
to. When database security is being implemented, data privacy should be put as a key
consideration since the data stored in the database may contain sensitive data for a customer thus
it should not be exposed even to the database administrator. Data like card details or personal
information like identity card numbers are private information and should not be exposed to a
stranger without the owner’s consent.
The impact of losing data privacy in a database setup causes a threat of identity theft where who
accesses the breached data or information can use it to commit a crime with details belonging to
other individuals, therefore, making the individual to be considered as a suspect in criminal
activity. Also losing data privacy results in loss of business in the organization trusted with the
confidentiality of stored data since it will have a bad reputation to the outside world thus people
or other businesses will not trust it making it to have low traffic meaning decline in business.
Data privacy loss impacts to brand reputation damage as the business that breaches database
security will have their image destroyed by the complainants, therefore, having a hard time to
rebrand and recreate their name again.

3

b) Security Measures for database privacy
Data encryption is a security measure used as a standard procedure by organizations to ensure
that the data stored in the database is private and it is not visible to everyone. Encrypting data is
not only used in the usable data but also backup data using the encryption methods with keys
only visible to regulated individuals. Data encryption is recommended since it transfers and
stores data in ciphers that are mostly irreversible and therefore ensuring confidentiality and trust
to all clients.
The use of strong passwords is a measure that must be put in place to allow users to choose a
password that cannot be guessed by attackers and to avoid similarity with other users. The strong
passwords must be in a way that the database can decline any password keyed in that is almost
similar to a saved password. Hackers take advantage of guessing the most obvious passwords
and if they key entry to the database they can steal all the confidential information stored thus the
need to making it mandatory to use strong passwords. Strong passwords include the use of a
combination of characters, numbers, and special characters with a length that is long enough.
Another security measure to implement is having antivirus protection which is an indispensable
method of protecting and ensuring data privacy. The antivirus is designed to remove viruses,
search for viruses, detect the presence of any virus, and prevent attack by viruses to your data
which act as a strong threat and bleach to data privacy. The antivirus always updates the
computer user if there is any potential virus present in the data stored so that precautionary
measures can be implemented before the damage arises.
Manage database access tightly in a way that you should li...

UCLA

Anonymous
Thanks for the help.

Anonymous
Outstanding. Studypool always delivers quality work.

Anonymous
Tutor was very helpful and took the time to explain concepts to me. Very responsive, managed to get replies within the hour.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
Similar Questions
Related Tags