Thursday, November 21, 2019
Database Secuirty Coursework Example | Topics and Well Written Essays - 1500 words
Database Secuirty - Coursework Example As such, the company ought to put in place structures that will ensure information security in two main ways, (1) authentication and authorization, and (2) general policies and procedures. The firmââ¬â¢s database containing all information pertaining to tenants and other aspects of the business will be stored in two main servers. These servers will be accessible by all tenants and building managers. Every database user will have a login account that will allow them access to the database. There are two general types of accounts, (1) tenant accounts for tenants, and (2) manager accounts for building managers. Each account will determine the scope of information that the given user is allowed. While manager accounts will have administrator privileges, tenant accounts will have very limited access to the database. Each login account will have a password that will be created by each user upon creation of the account. A firewall is in essence a baseline control for the securing of any network environment of any enterprise. Routers are usually integrated with a firewall. Examples include software based packet filtration and Network Address Translation. A distinct firewall that is hardware based is recommended. This is due to the disturbing fact that hackers in this time and age employ advanced technology and methodologies that they use to breach networks. A good example of this is APT (Advanced Persistent Threats). These employ advanced phishing techniques and complex algorithms. The threat posed by such security menaces may damage a companyââ¬â¢s reputation or compromise the integrity of its confidential information, causing it to lose clientele as banks would in the case where credit card numbers are leaked. The use of a firewall supplemented by an antivirus is not sufficient to ensure information security. An intrusion detection system will be put in place. An intrusion detection system is vital for the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.