Monday, June 24, 2019

Database Secuirty Coursework Example | Topics and Well Written Essays - 1500 words

Database Secuirty - Coursework ExampleAs such, the company ought to put in place structures that will ensure information security in two briny ways, (1) authentication and authorization, and (2) general policies and procedures.The firms database containing all information pertaining to tenants and other aspects of the business will be stored in two main servers. These servers will be accessible by all tenants and building passenger cars.Every database manipulationr will have a login account that will allow them access to the database. There ar two general types of accounts, (1) tenant accounts for tenants, and (2) manager accounts for building managers. Each account will determine the scope of information that the given user is allowed. While manager accounts will have administrator privileges, tenant accounts will have very limited access to the database. Each login account will have a give-and-take that will be created by each user upon creation of the account.A firewall is in essence a baseline control for the securing of any network surroundings of any enterprise. Routers are usually integrated with a firewall. Examples include software found packet filtration and Network Address Translation. A distinct firewall that is hardware based is recommended. This is due to the disturbing fact that hackers in this time and age employ advanced technology and methodologies that they use to breach networks. A good example of this is apposite (Advanced Persistent Threats). These employ advanced phishing techniques and complex algorithms. The threat posed by such security menaces may damage a companys report card or compromise the integrity of its confidential information, causing it to lose clientele as banks would in the case where credit card numbers are leaked.The use of a firewall supplemented by an antivirus is not sufficient to ensure information security. An intrusion maculation system will be put in place. An intrusion detection system is vital for the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.