University of the Cumberlands Database Security Discussion

User Generated

fgnex1234

Computer Science

University of the Cumberlands

Description

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached. Please let me know if you have any questions or need revisions.

1

Database Security

Student's Name
Course
University
Professor
Date

2

Database Security
Introduction
Organizations normally have a massive inflow of data that relate to their specific area of
operation. Therefore, the management is tasked with the responsibility of securing these large
amounts of sensitive data in a protected database, thereby making most databases a major target
for cybercrimes. Hence, this calls for a more advanced database security system to handle
sensitive information to avoid any breaches effectively. Organizational databases contain
personal information like financial statements, employee credentials and identities that
cybercriminals may want to steal and trade with the company's competitors. This paper indicates
the best practices that can be developed and implemented to improve database security. Also, it
outlines a security model that an organization can use to develop its database security.
Organizational Database protection best practices
a. Separating web and database servers
Organizations should always ensure that they separate their database systems from the
web servers to make the database more secure. This helps when cybercriminals attack the
company's website servers, they will not be able to access the database since the two servers are
separated. It is always recommended that unnecessary servers and programs be kept separately
from the other servers that do not influence their operational capabilities (Mariuţa, 2014).
Nevertheless, these servers may require communication and information sharing between them at
some point. Hence, an organization should confine their permissions at minimum levels of the
accessibility required to operate them successfully. Therefore, the extent of attack that a
cybercriminal can cause is limited.

3

b. Maximize the Database security controls
The world is becoming more innovative, and hackers are taking advantage of the
available technological knowledge to create more ardent system viruses that can easily
compromise the security of a co...


Anonymous
I use Studypool every time I need help studying, and it never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags