Thursday, December 19, 2019

Database Security Requirements Computer Systems...

4. DATABASE SECURITY REQUIREMENTS 4.1. ORACLE SECURITY Just like the computer systems controlled access requirements, authentication on the Oracle level is also required were a user must enter a distinct ID and password. According to Mehta (2004), â€Å"user authentication at the Oracle level can be configured through creating custom profile(s) within the dba_profiles table. A profile within Oracle is a set of controls that can be applied to users. Different profiles can be created for different classes of accounts† (p.41). In addition to authentication, authorization is also an important aspect of Oracle security. Without the proper granting of privileges to a user, a user won’t be able to do anything. The key privileges for users are: †¢ SELECT – This privilege gives the user the ability to select and view data from specified database tables (Harter, 2008, p.2). †¢ UPDATE – This privilege gives the user the ability to modify data values in specified database tables (Harter, 2008, p.2). †¢ DELETE – This privilege gives the user the ability to delete rows/records from specified database tables (Harter, 2008, p.2). †¢ INSERT- This privilege gives the user the ability to add new rows/records into specified database tables (Harter, 2008, p.2). These privileges are granted through the Database Administrator (DBA) that provides access using Oracle data definition language (DDL) commands (Harter, 2008). 4.2. BANNER SECURITY Oracle Forms are a toolset that is used to create theShow MoreRelatedDatabase Technology And Its Impact On Business Operations1577 Words   |  7 Pages Introduction Database technology is one of the technologies that is every ware. We can say they almost permeate our lives: Banking, health care providers, libraries, online stores, beauty salons, travel agencies, phone companies, government agencies like FBI, INS, IRS, and NASA — they all use databases.(needs paraphrasing). The question is why are the important? They allow data to be retained and shared electronically and the amount of data contained in these systems continues to grow at an exponentialRead MoreAssessment of Risk Management and Control Effectiveness at Cincom Systems1581 Words   |  6 PagesCincom Systems Introduction Based on the Information Asset Inventory and Analysis completed for Cincom Systems the next phase of improving their enterprise security management strategy is to concentrate on assessments of risk management and control effectiveness. This specific study evaluates the effectiveness of the security technologies and methodologies in place at Cincom, also determining uncertainty and calculating the risk of the most dominant threats. Additional security requirements are needRead MoreBusiness Context : Alaworks Supports Reporting Requirements For Various Federal And State Laws And Regulations1568 Words   |  7 Pages Business Context: Alaworks supports reporting requirements for various Federal and State laws and regulations. The system currently meets the needs of its user community. However, the question remains whether the â€Å"user needs,† including security, can be met once the administrative entity changes are fully implemented. For the first year, ADECA and Commerce have a Memorandum of Understanding to allow ADECA IT personnel to continue managing Alaworks and assist Commerce with a smooth transitionRead MoreIS3230 Unit 4 Assignment 1 Chris Wigint1197 Words   |  5 PagesMarquez 14 April, 2014 Access Control Plan INTRODUCTION This Dragon Net Solutions (DNS) Access Control and Account Management Plan details the access control and account management activities for Dragon Net Solutions. It facilitates compliance with the National Institute of Standards and Technology’s (NIST) Recommended Security Controls for Federal Information Systems (NIST 800-53) and the NIST Guide for Accessing the Security Controls in Federal Information Systems (NIST 800-53A). SpecificallyRead MoreComputer security is very essential to proyect against the threats caused to computing system which800 Words   |  4 PagesComputer security is very essential to proyect against the threats caused to computing system which happen because of its vulnerability. Threat to computing security takes place by a person, event or circumstance may be intentionally for sake of finance or unintentionally by deleting some of the important data. A threat agent depends on method, opportunity and motivation. Method is a knowledge to attack , oppur tinity to access the necessary information and motive behind the aatack. In olden daysRead MoreMicrosoft Vs. Multi File Database1594 Words   |  7 Pagesdifferent database technologies. Each technology offers its own pros and cons and below is a look at of the most common technologies. Single- vs. multi-file databases A notable different between technologies can be whether they are single-file or a multi-file database. Single-file database Single-file database is the simplest database structure, as it consists of unified information, which can often be used and accessed in a pre-determined manner. Complexity in a single-file database is not commonplaceRead MoreBasic Rules Of Evidence Are No Different For Electronic Records Essay859 Words   |  4 PagesGeneral Requirements for Admissibility Generally, the rules of evidence are no different for electronic records than for paper records. Medical records are first subject to the hearsay rule, which says that any statement made out of court by a person not currently testifying is not admissible. However there are a number of exceptions to this rule, one of which is the Business Records Rule. Medical records are considered business records. For any business record to be admissible in a legal proceedingRead MoreThe Evolution Of Database Management System1099 Words   |  5 PagesThe Evolution of DBMS A database management system, also known as DBMS, is a type of software that is used in order to create and manage a multitude of databases. Data is the power that runs most modern businesses. This specific program provides a technique for people to use a â€Å"systematic† way to create, retrieve, update, and manage many diverse types of data. DBMS is used to manage three important things, which is data, database engine, and database schema. These different elements help to provideRead MoreHOC Cyber Security Profiles888 Words   |  4 PagesHOC Cyber Security Profiles Introduction Cyber security profiles (System Security Plans or SSP) are an essential component within an organizational security program. An Organizations Cyber security profile references to information pertinent to the security of a system such as security issues, security controls, security categories to which the system belongs, and concern pertaining to the environment in which the system is installed. Cyber security profiles provides security administratorsRead MoreMy Team ( Xyz Digital Forensic Inc. Essay894 Words   |  4 Pagesinvolves analyzing HCC network and database server and PC’s for a potential breach of data. My first objective is to find out what policies and procedures does the company adhere to. Even though the user PC’s are consider work related objects. Many time, users save their private information on their work computers. This includes pictures, writings and email. From my conversation with the Legal, security staff and Upper management have given my team full access to the companies network logs, server

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.