Wednesday, May 15, 2019

Database Secuirty Coursework Example | Topics and Well Written Essays - 1500 words

Database Secuirty - Coursework ExampleAs such, the company ought to put in place structures that go forth ensure information security in dickens main ways, (1) authentication and authorization, and (2) customary policies and procedures.The firms database containing all information pertaining to tenants and other aspects of the business will be stored in two main servers. These servers will be accessible by all tenants and building managers.E actually database user will have a login account that will allow them access to the database. There are two widely distributed types of accounts, (1) tenant accounts for tenants, and (2) manager accounts for building managers. Each account will determine the scope of information that the prone user is allowed. While manager accounts will have administrator privileges, tenant accounts will have very limited access to the database. Each login account will have a password that will be created by each user upon creation of the account.A firewall is in essence a baseline train for the securing of any network environment of any enterprise. Routers are usually integrated with a firewall. Examples include software program based packet filtration and Network Address Translation. A distinct firewall that is hardware based is recommended. This is due to the perturbing fact that hackers in this time and age employ advanced technology and methodologies that they use to breach networks. A good example of this is APT (Advanced Persistent Threats). These employ advanced phishing techniques and complex algorithms. The threat posed by such security menaces may damage a companys reputation or agree the integrity of its confidential information, causing it to lose clientele as banks would in the case where credit card numbers are leaked.The use of a firewall supplemented by an antivirus is not sufficient to ensure information security. An assault detection system will be put in place. An intrusion detection system is zippy for the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.