College of Banking and Financial Studies
Question Description
I’m stuck on a Computer Science question and need an explanation.
(Code: A95/ date29/6/2020)
******
Which subject:
Database security
If there is any program to use :use SQL in Task 2
Calculations or thury:
Thury
How many words:2000
*********
Turniti report needed Similarity less than5% .
All the requirements in attach file .
Unformatted Attachment Preview

Final Answer

please receive this document for the answers
ASSIGNMENT NAME
Database Security
MODULE NAME
SESSION
STUDENT NAME
STUDENT ID
FACULTY NAME
Table of Contents
Task 1 ........................................................................................................................................................ 3
a)
Impact of losing data privacy in database security ....................................................................... 3
b)
Security Measures for database privacy........................................................................................ 4
Task 2 ........................................................................................................................................................ 5
a)
Security vulnerabilities ................................................................................................................. 5
b)
Updating the profile ...................................................................................................................... 6
Task 3 ........................................................................................................................................................ 7
SQL audit trigger command .................................................................................................................. 7
Task 4 ........................................................................................................................................................ 8
a)
Plan for effective backup management ......................................................................................... 8
b)
Backup restoration testing plan ..................................................................................................... 9
References .............................................................................................................................................. 11
2
Task 1
a) Impact of losing data privacy in database security
Data privacy refers to how information or data is handled depending on the purpose it is intended
to. When database security is being implemented, data privacy should be put as a key
consideration since the data stored in the database may contain sensitive data for a customer thus
it should not be exposed even to the database administrator. Data like card details or personal
information like identity card numbers are private information and should not be exposed to a
stranger without the owner’s consent.
The impact of losing data privacy in a database setup causes a threat of identity theft where who
accesses the breached data or information can use it to commit a crime with details belonging to
other individuals, therefore, making the individual to be considered as a suspect in criminal
activity. Also losing data privacy results in loss of business in the organization trusted with the
confidentiality of stored data since it will have a bad reputation to the outside world thus people
or other businesses will not trust it making it to have low traffic meaning decline in business.
Data privacy loss impacts to brand reputation damage as the business that breaches database
security will have their image destroyed by the complainants, therefore, having a hard time to
rebrand and recreate their name again.
3
b) Security Measures for database privacy
Data encryption is a security measure used as a standard procedure by organizations to ensure
that the data stored in the database is private and it is not visible to everyone. Encrypting data is
not only used in the usable data but also backup data using the encryption methods with keys
only visible to regulated individuals. Data encryption is recommended since it transfers and
stores data in ciphers that are mostly irreversible and therefore ensuring confidentiality and trust
to all clients.
The use of strong passwords is a measure that must be put in place to allow users to choose a
password that cannot be guessed by attackers and to avoid similarity with other users. The strong
passwords must be in a way that the database can decline any password keyed in that is almost
similar to a saved password. Hackers take advantage of guessing the most obvious passwords
and if they key entry to the database they can steal all the confidential information stored thus the
need to making it mandatory to use strong passwords. Strong passwords include the use of a
combination of characters, numbers, and special characters with a length that is long enough.
Another security measure to implement is having antivirus protection which is an indispensable
method of protecting and ensuring data privacy. The antivirus is designed to remove viruses,
search for viruses, detect the presence of any virus, and prevent attack by viruses to your data
which act as a strong threat and bleach to data privacy. The antivirus always updates the
computer user if there is any potential virus present in the data stored so that precautionary
measures can be implemented before the damage arises.
Manage database access tightly in a way that you should li...
