Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Project Identification and Business Environment -- 20 points Address the following topics as they apply to your policy: 1. Establish authorities and responsibilities for database
Project Identification and Business Environment -- 20 points
Address the following topics as they apply to your policy:
1. Establish authorities and responsibilities for database security management.
2. Develop operational and incident management procedures when security breaches are discovered.
3. Define personnel and procedures for daily administration and maintenance of security policies.
Part 2: Architecture and Operating System Considerations -- 20 points
Address the following topics as they apply to your policy:
1. Define the architecture for your system. Does it use client server, web, or application servers? Given the architecture, elaborate on what methods will be used in your database to support this architecture. Consider the following elements in the formulation of your policy:
o Integration of DBMS security with client applications and operating systems
o Integration of DBMS security with network operations
o Integration of DBMS security with server operating systems
o Integration of DBMS security with web servers and application servers
2. Define requirements as they relate to database security. This includes, but is not limited to: connection pooling, proxies, application roles, file permissions, privileged accounts, password requirements, and other methods appropriate to your selection.
Part 3: User Accounts and Password Administration -- 30 points
Address the following topics as they apply to your policy:
1. User administration
2. Password policies
3. Profile definitions and assignments. What is the criterion for assignment of a profile to an account?
Part 4: Privileges and Roles -- 30 points
Address the following topics as they apply to your policy.
1. Security model selection
2. Roles, including privileged roles assignment and administration and role policies
3. System privileges
4. Object privileges
Part 5: Database Security Operations -- 30 points
Address the following topics as they apply to your policy
1. Requirements and methodology for database logging
2. Requirements and methodology for activity auditing
Part 6: Data Isolation Policies -- 30 points
Address the following topics as they apply to your policy:
1. Requirements for data isolation
2. Database views
3. Database triggers
4. Database stored procedures
Part 7: Physical Environment for Secured Databases -- 20 points
Address the following topics as they apply to your policy:
1. Use of physical security and control mechanisms systems
2. Database backup and restore practices relating to security
Part 8: Conclusion, Summary, and References -- 20 points
1. Develop a summary and conclusion for your paper
2. Cite your references
Address the following topics as they apply to your policy:
1. Establish authorities and responsibilities for database security management.
2. Develop operational and incident management procedures when security breaches are discovered.
3. Define personnel and procedures for daily administration and maintenance of security policies.
Part 2: Architecture and Operating System Considerations -- 20 points
Address the following topics as they apply to your policy:
1. Define the architecture for your system. Does it use client server, web, or application servers? Given the architecture, elaborate on what methods will be used in your database to support this architecture. Consider the following elements in the formulation of your policy:
o Integration of DBMS security with client applications and operating systems
o Integration of DBMS security with network operations
o Integration of DBMS security with server operating systems
o Integration of DBMS security with web servers and application servers
2. Define requirements as they relate to database security. This includes, but is not limited to: connection pooling, proxies, application roles, file permissions, privileged accounts, password requirements, and other methods appropriate to your selection.
Part 3: User Accounts and Password Administration -- 30 points
Address the following topics as they apply to your policy:
1. User administration
2. Password policies
3. Profile definitions and assignments. What is the criterion for assignment of a profile to an account?
Part 4: Privileges and Roles -- 30 points
Address the following topics as they apply to your policy.
1. Security model selection
2. Roles, including privileged roles assignment and administration and role policies
3. System privileges
4. Object privileges
Part 5: Database Security Operations -- 30 points
Address the following topics as they apply to your policy
1. Requirements and methodology for database logging
2. Requirements and methodology for activity auditing
Part 6: Data Isolation Policies -- 30 points
Address the following topics as they apply to your policy:
1. Requirements for data isolation
2. Database views
3. Database triggers
4. Database stored procedures
Part 7: Physical Environment for Secured Databases -- 20 points
Address the following topics as they apply to your policy:
1. Use of physical security and control mechanisms systems
2. Database backup and restore practices relating to security
Part 8: Conclusion, Summary, and References -- 20 points
1. Develop a summary and conclusion for your paper
2. Cite your references
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started