Sign In
Not register? Register Now!
You are here: HomeEssayTechnology
Pages:
2 pages/≈550 words
Sources:
4 Sources
Level:
MLA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:

Security Layers to be Implemented for a Database Management System (Essay Sample)

Instructions:

The paper was about "Security Layers to be Implemented for a Database Management System" in MLA format, 2 pages with at least four citations

source..
Content:
Name
Lecturer’s name
Course number
Date (date month year)
Security Layers to be Implemented for a Database Management System
In this information age, data is a vital asset. Corporation and Organizational concern on database security therefore increases exponentially each passing moment. Database management together with other information assets has become part of the key areas affecting companies today. When compromised or exposed to attackers, information can cause significant negative effect on the business, company reputation or even bring down a whole corporation. In order to avoid all these, database management systems must be protected at all costs. This paper aims at discussing various security measures/layers to be implemented for database management systems in networked corporations
Security strategies must focus on avoiding all forms of risk. A security strategy must mitigate the overall possibility of harm or loss of companies data ( Baccam 2). To design such a system, system requirements and spectrum of threats to the data must be understood and controls implemented to protect people, processes and the technology in terms of information within an organization. Some of the security layers implemented include access control, logical control(auditing, authentication, encryption and passwords), integrity controls, backups and data recovery strategies together with application security.
Many database systems have been secured from hackers through security measures such as firewalls and intrusion detection systems. However, access to programs and data within these systems continues to be at stake with growth in the internet networking i.e. internet access. Access controls not only protect against external and internal attackers, they can also protect from the mistakes that users introduce( Baccam 7). A good example of such a case is a user who deletes an important object on the assumption that it is not in use. To curb this, many organizations develop their own " baseline" security standards and designs detailing basic security measures for their database management systems(Database security ). Some of the measures to be implemented are good laws and regulations, policies and accepted practices concerning privacy, accounts and company reports. a paper on ways to secure stored data recommends implementation of multiple layers of defense for protection in case one of the perimeters is compromised(Schulz 1).
Logical controls and security will involve securing the networks with firewalls, running antispy-ware and virus detection programs on servers and storage systems. Without strategies like logic unit number mapping, encrypting and decrypting of data in transit and at rest, use of passwords and usernames, stored data is vulnerable to unauthorized or disruptive access. Auditing of adm...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Describe the Highway System of a Jurisdiction
    Description: In the start of 20th century, there was no existence of the uninterrupted system of highway at the national level....
    4 pages/≈1100 words| MLA | Technology | Essay |
  • Big Data and Data Mining
    Description: The task was about description o various terns that are used to define big data aspects. It was also bout the explanation of some of the major trends in big data, data centres and overall data storage...
    1 page/≈275 words| MLA | Technology | Essay |
  • Space Exploration
    Description: Space exploration is the endless investigation by means of manned and unmanned spacecraft of celestial structures beyond Earths atmosphere and developing the growth of space technology...
    1 page/≈275 words| MLA | Technology | Essay |
Need a Custom Essay Written?
First time 15% Discount!