Assume that you are the database security analyst for the TECHTEC LLC. The employees are mostly...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Assume that you are the database security analyst for the TECHTEC LLC. The employees are mostly working in shift basis. When 50% of the employees are working from home due to the covid-19 pandemic by accessing the database for the salary details, shift schedule and feedback the others are in the company. The Sales table is used by different users. But the data what they see may be different. In one table not all the columns or rows are allowed for a user. The user security level is mentioned in brackets. a. The Technician(C), Manage(S)r, Supervisor(C), Managing Director(TS) and Workers (U) are the users in the system. They should be allowed to see what they are privileged for based on their security clearance. Other data must be hidden. Which mechanism will you use to manage this requirement in your database system? Design your own employee table. Write down the SQL statement to create the table and add records (10 records) and illustrate the mechanism with examples from the given scenario. b.Design a password policy for the user's account password usage (History). It should include how many days to wait before changing the password and how many times the same password can be used. Write down the policy statement clearly. c. Implement the policy designed in question b using the Profile. Use appropriate SQL commands and you can use any name for the profile starting with FinalB. [Example; Finalprof] Assume that you are the database security analyst for the TECHTEC LLC. The employees are mostly working in shift basis. When 50% of the employees are working from home due to the covid-19 pandemic by accessing the database for the salary details, shift schedule and feedback the others are in the company. The Sales table is used by different users. But the data what they see may be different. In one table not all the columns or rows are allowed for a user. The user security level is mentioned in brackets. a. The Technician(C), Manage(S)r, Supervisor(C), Managing Director(TS) and Workers (U) are the users in the system. They should be allowed to see what they are privileged for based on their security clearance. Other data must be hidden. Which mechanism will you use to manage this requirement in your database system? Design your own employee table. Write down the SQL statement to create the table and add records (10 records) and illustrate the mechanism with examples from the given scenario. b.Design a password policy for the user's account password usage (History). It should include how many days to wait before changing the password and how many times the same password can be used. Write down the policy statement clearly. c. Implement the policy designed in question b using the Profile. Use appropriate SQL commands and you can use any name for the profile starting with FinalB. [Example; Finalprof]
Expert Answer:
Answer rating: 100% (QA)
a To manage the access control requirements in the database system we can use RoleBased Access Contr... View the full answer
Related Book For
Principles of Auditing and Other Assurance Services
ISBN: 978-0078025617
19th edition
Authors: Ray Whittington, Kurt Pany
Posted Date:
Students also viewed these programming questions
-
Tempo Company's fixed budget (based on sales of 14,000 units) folllows. Fixed Budget Sales (14,000 units x $202 per unit) Costs Direct materials Direct labor Indirect materials Supervisor salary...
-
The new line character is utilized solely as the last person in each message. On association with the server, a client can possibly (I) question the situation with a client by sending the client's...
-
Give Correct ANSWERS Human-Computer Interaction (a) If you had been one of the original inventors of the WIMP interface, and engineers on the technical team had been sceptical about the advantages...
-
Find the laurents series f(z)= 1/(z-1)(z-2) (i) |z| <1 (ii) 1 2
-
Roll's critique of tests of the CAPM shows that if the index portfolio is ex post efficient, it is mathematically impossible for abnormal returns, as measured by the empirical market line, to be...
-
The executives at CBC have four main areas in which they are interested: They want to see how they are doing in ratings against the other networks and how the ratings will continue to change in the...
-
Modify Table 10-1 web site for to indicate whether each control listed there is preventive, detective, or corrective in nature. 10.2Table 10-1 suggests that restricting physical access to inventory...
-
1. Some observers maintain that privacy rights are quickly becoming a thing of the past. In your opinion, is it possible to protect privacy rights in todays online world? 2. Many argue that the...
-
The skills of interviewing, are they a learned trait or something that we are born with? provide the source citation in APA style ...
-
Toyota and other car manufacturers produce very different models depending on the countries in which the cars will be sold. Which organizational structure would make the most sense when products are...
-
Consider a force field F(x, y) = 3yi - xyj acting over the curve C given in the figure below. (-4,1) L (0,5) A (3,2) a) Show that the force field F is not conservative. b) Compute the work done by...
-
What does the phrase explain whether the unit cost computed above is a "true" product cost, in the sense of absolute authenticity and verifiability mean? What does it mean by absolute authenticity...
-
A manufacturing plant draws a sample of 28 screws from the production line and finds their diameter has a mean of 4.06 cm and a standard deviation of 0.39 cm. What is the 99% confidence interval for...
-
Choose five Indian companywhich fits to the concepts of : (a) Strategically Adrift; (b)Distracted (c) Capability Constrained (d)In the Game (e) Ready for Growth; and explain the reasons how and why...
-
At the bottom of the column for each stock calculate the Average Monthly Return (use AVERAGE() function) and the Standard Deviation [use STDEV.P()] population function NOT STDEV() sample function)....
-
At the end of the year, the company had actually incurred the following:
-
When the concentration of a strong acid is not substantially higher than 1.0 10-7 M, the ionization of water must be taken into account in the calculation of the solution's pH. (a) Derive an...
-
Derive Eq. (14-14) and the form of this equation if the system is very dilute. Y = (Fsolid/Fsolv) X+Y-(Fsolid /Fsolv)X0
-
Because the feed underflow in Example 14-1 was not the same as in the other stages, we had to do the feed stage calculation separately, but connected to, the calculation for the remainder of the...
-
Derive Eq. (14-15a) and the corresponding equation for \(\mathrm{x}_{\mathrm{D}, \mathrm{M}}\). (14--15a) XA.M EOYA,0 + FXA,N+1 EO+F 0+(1000) (0.2) 662+1000 = 0.120
Study smarter with the SolutionInn App