Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Write a paper about law, ethics, and security plan and database management system. Articulate the relevant legal and ethical standards that need to be considered

Write a paper about law, ethics, and security plan and database management system. Articulate the relevant legal and ethical standards that need to be considered in your solution design and in future implementation. Determine the best practices in design, data use, and storage to ensure legal compliance. The regulations in place and the best practices for aligning operations will likely change depending on the type of industry in which your company resides. Support your conclusions with research support. Determine best practices in design, data use, and storage to ensure ethical operation of your company. These best practices will likely change depending on the industry in which your company resides. Support your conclusions with research support. In consideration of the type of organization you selected (wild wood apartment), the data used, and your consideration of legal and ethical standards, discuss the security needs of your DBMS solution. Considering the group/department for which you constructed your enterprise data model (milestone four please see the attached document), discuss the differences in security needs at this level in comparison with those of the company as a whole. Given the comparisons and discussions above, recommend a comprehensive but high-level (pertaining to the solution as a whole rather than the particular department) security management plan for your design that will align to organizational needs. Complete your final project by submitting your database management system. This database management system will include the material development for the four final project milestones and the security plan and should address the feedback received in response to those submissions. The final project should be a complete, polished artifact containing all of the crucial elements of the final project. All this has to be discoursed: organization:

problem organization:

departments and operations analysis and design:

conceptual model analysis and design:

logical model analysis and design: physical design DBMS:

research DBMS:

analysis DBMS:

recommendation DBMS:

hardware, software data model:

enterprise data model data model:

operating rules data model:

rule reflection law, ethics, and security:

standards law, ethics, and security:

legal compliance law, ethics, and security:

ethical practices law, ethics, and security:

security needs of solution law, ethics, and security:

database security plan articulation of response note:


Step by Step Solution

3.33 Rating (159 Votes )

There are 3 Steps involved in it

Step: 1

Introduction The security environment is consists of three subsectionsAssumptions threats and security policies of the organization Security consultants help the projectdevelopment team and work with ... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database System Concepts

Authors: Henry F. Korth, S. Sudarshan

4th Edition

978-0073523323, 0-07-255481-9, 73523321, 978-0072554816

More Books

Students also viewed these Databases questions