Question: You should take Security Requirements for DBMS into your consideration and document whatever practice you perform to apply these requirements. Ex: i. Access control:

You should take Security Requirements for DBMS into your consideration and document

You should take Security Requirements for DBMS into your consideration and document whatever practice you perform to apply these requirements. Ex: i. Access control: what model you used? How do you apply it? ii. User authentication: What mechanisms you used? How do you apply it? iii. Availability: What mechanisms you used? How do you apply it? iv. Auditability: What mechanisms you used? Which significant functions do you audit? How do you apply it? b. Provide your Database Backup and Recovery Strategy (disaster recovery plan, Database recovery, Business continuity plan).

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

Access Control i Access Control Model We use RoleBased Access Control RBAC model ii How its Applied ... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!