Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please refer to the picture attached in order to answer the question properly. Develop a threat analysis for the pizza company database. Please make copy

image text in transcribed

Please refer to the picture attached in order to answer the question properly.

Develop a threat analysis for the pizza company database.

Please make copy paste available.

Recovery Procedure 1. Rebuild the computer as necessary 2. Retrieve the hard disk with the most recent backup date 3. Restore the database from backup 4. Restore remaining transactions from the most recent logs S. Attempt to recover any lost data by reviewing paper receipts an 6. When the database is rebuilt, begin the backup procedure d invoices When she looks at the permissions tables, Sharon is surprised to realize that the most dangerous user, aside from the database administrator who can do anything and DELBTE permissions, she or he could accidently delete records that should not be deleted or create updates that change records that should not be changed. The adminis- trator could also do the most damage intentionally, though Sharon considers it unlikely is surely the program administrator. Because the administrator has complete UPDATE t a prosram administrator would maliciously attack the database. Program Administrator Threats Role Threat SELECT INSERT Program Administrator Description Data entry mistakes can make the data and the reports based on the data unreliable and inaccurate Updating more records than intended by overly broad or missing WHERE criteria Bad data in the update Accidental deletion of records UPDATE DELETE tCharon considers the tutor role. The primary area of concern with tutaneis dupdate this able. She could imagine a tutor trying to get access to private student informauon She can also imagine a tutor trying to falsify the tutoring schedule by adding student IDs to open sessions to look like they were filled when they weren't. The policy that says that a tutor's sessions can be reduced or eliminated if the tutor's services are not used provides sufficient ativation for such activities. It is also possible that a tutor whose hours have been reduced or emie could attempt to attack the database by changing other tutor's the Session table. Tuors wrnave perussien schedules by entering talse Role Threat SELECT INSERT UPDATE DELETE Tutor Threats Tutor Description Select private student information Accidental or malicious schedule entry Acciden tal or malicious changes to one's own or other's schedule

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Professional Visual Basic 6 Databases

Authors: Charles Williams

1st Edition

1861002025, 978-1861002020

Students also viewed these Databases questions