Discussion: Database Protection

User Generated

onlb_xnl

Computer Science

Description

In this discussion, analyze the effectiveness of the securities in place at an organization.

Describe the security that is in place at your workplace or at the workplace of a friend or relative. Examples of security measures include the steps needed for an employee to log in to the network, how often employees or customers must change passwords, and so forth.

Do you think the security is appropriate for the organization? What additional steps do you think the organization could take to ensure their data is protected?

Also, assume the role of a hacker who is trying to access your peers’ organization. Based on the security that is place at your peers workplace, do you think the security is sufficient in protecting the data? If not, how might you gain access?

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: DATABASE PROTECTION

Database Protection

1

DATABASE PROTECTION

2

Database Protection
A database is the center of every organization’s operations. It engineers the company’s
transactions such as financial data, strategic operations, employee and customer personal
information. The sensitivity of such information has challenged various organizations to adopt
data protection strategies. Security entails preventing unauthorized access to the systems, network
and other essential data facilities (Chen, 2012). Database security allows an organization to focus
on its operations and ensure that it del...


Anonymous
Great! Studypool always delivers quality work.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags