1,167
10
Essay, 2 pages (400 words)

Securing database security essay

Question 1

I find that the answer that has been given is substantive and enough to define what is to be looked into. The most important security concerns that companies experience today are the management of assets like data and the general security of the information systems that are there in place today. This paper will discuss the strategies and the features that need to be taken into consideration in the design of the database for the new enterprise that has been described. It is true that there is need to have access control. There is need to have access controls that will not only protect the data from internal and external attackers but also from errors that users will make. An example of an error is that of a user deleting an important database object like a table assuming that they are not that important. The answer that has been given can be said to be original and well structured.

Question 2

The second answer serves well for the online database. There is need to ensure that they meet the requirements of data transmission. Another important security features that should be considered is encryption. It is a strong security measure if its implementation is taken seriously. While it is true that it is strong, it is not a magical solution that will solve all the security issues of an organization (Wang, Du, & Lehmann, 2010). It is also true that no security strategy would be deemed to be complete without the use of encryption. In our case, there will be the need to have data encryption for the data at rest as they are the data that is found in the database. The organization will have to consider encrypting the data that is at rests in the database. The answer is original but not exhaustive.

Question 3

The answer to this question is that of separation of environments. There is need to ensure that this is achieved. Another issue that will need to be considered is that of separation of environments. The best information security practice has been that of separating of production, test, QA or similar environments. This practice has been integrated in many audit programs for a long time and it has been effective (Coronel, Morris, & Rob, 2009).

References

Wang, T., Du, H., & Lehmann, C. (2010). Accounting for the benefits of database normalization. American Journal of Business Education , 3 (1), 41-52.
Coronel, C., Morris, S., & Rob, P. (2009). Database systems: Design, implementation, and management. New York: Cengage Learning.

Thank's for Your Vote!
Securing database security essay. Page 1
Securing database security essay. Page 2
Securing database security essay. Page 3

This work, titled "Securing database security essay" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Securing database security essay'. 23 February.

Reference

AssignBuster. (2022, February 23). Securing database security essay. Retrieved from https://assignbuster.com/securing-database-security-essay/

References

AssignBuster. 2022. "Securing database security essay." February 23, 2022. https://assignbuster.com/securing-database-security-essay/.

1. AssignBuster. "Securing database security essay." February 23, 2022. https://assignbuster.com/securing-database-security-essay/.


Bibliography


AssignBuster. "Securing database security essay." February 23, 2022. https://assignbuster.com/securing-database-security-essay/.

Work Cited

"Securing database security essay." AssignBuster, 23 Feb. 2022, assignbuster.com/securing-database-security-essay/.

Get in Touch

Please, let us know if you have any ideas on improving Securing database security essay, or our service. We will be happy to hear what you think: [email protected]