Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Please refer to the picture attached in order to answer the question properly. Develop a threat analysis for the pizza company database. Please make copy
Please refer to the picture attached in order to answer the question properly.
Develop a threat analysis for the pizza company database.
Please make copy paste available.
Recovery Procedure 1. Rebuild the computer as necessary 2. Retrieve the hard disk with the most recent backup date 3. Restore the database from backup 4. Restore remaining transactions from the most recent logs S. Attempt to recover any lost data by reviewing paper receipts an 6. When the database is rebuilt, begin the backup procedure d invoices When she looks at the permissions tables, Sharon is surprised to realize that the most dangerous user, aside from the database administrator who can do anything and DELBTE permissions, she or he could accidently delete records that should not be deleted or create updates that change records that should not be changed. The adminis- trator could also do the most damage intentionally, though Sharon considers it unlikely is surely the program administrator. Because the administrator has complete UPDATE t a prosram administrator would maliciously attack the database. Program Administrator Threats Role Threat SELECT INSERT Program Administrator Description Data entry mistakes can make the data and the reports based on the data unreliable and inaccurate Updating more records than intended by overly broad or missing WHERE criteria Bad data in the update Accidental deletion of records UPDATE DELETE tCharon considers the tutor role. The primary area of concern with tutaneis dupdate this able. She could imagine a tutor trying to get access to private student informauon She can also imagine a tutor trying to falsify the tutoring schedule by adding student IDs to open sessions to look like they were filled when they weren't. The policy that says that a tutor's sessions can be reduced or eliminated if the tutor's services are not used provides sufficient ativation for such activities. It is also possible that a tutor whose hours have been reduced or emie could attempt to attack the database by changing other tutor's the Session table. Tuors wrnave perussien schedules by entering talse Role Threat SELECT INSERT UPDATE DELETE Tutor Threats Tutor Description Select private student information Accidental or malicious schedule entry Acciden tal or malicious changes to one's own or other's scheduleStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started