26 Aug Databases have become an influential part of personal and professional settings in modern society.
Write answers for the following statements.
Post 1:
Database Security
Databases have become an influential part of personal and professional settings in modern society. Maintaining security within databases is essential to protect the integrity of the database and the privacy of the data. Database security “strives to ensure that only authenticated users perform authorized activities at authorized times.”(pg.62). Database security “…should not be only thought of as capturing of information but also as avoiding the violation of particulars such as integrity, availability, and confidentiality.” (Bakir, & Guclu, 2022). Understanding database security and the techniques that support security are important steps in database development and management. Two of the topics that Murray (2010) identified that will be discussed within this post are access control and auditing. Other topics Murray (2010) mentioned for database security include: vulnerability, application access, and inference (Murray, 2010).
Access Control and Auditing Mechanisms
Access control “is the process by which rights and privileges are assigned to users and database objects.” (Murray, 2020, pg.61). Controlling access helps to limit access to data through authentication, assigning rights, and authorization practices (Murray, 2010). Access can be granted or restricted to databases, tables, columns, or rows through access control (Murray, 2010). Zhu, et.al., (2022) identified some outdated practices within access control and started edge computing which uses cloud services and “real-time migration” to achieve efficient access control and security (Zhu, et.al., 2022). The concerns Zhu et.al. (2022) identified with older models of access control is that they have centralized authorization which can create a single-point failure within the system (Zhu, et.al., 2022). Auditing mechanisms “tracks database access and user activity providing a way to identify breaches that have occurred so that corrective action might be taken.”(Murray, 2010, pg.61). Auditing is useful for determining who accessed the database, what was changed, and what actions were carried out to help identify breaches within the system (Murray, 2010). Auditing can look like viewing logon attempts, changes in users, changes to database structure, changes to data, or errors that occurred within the database (Murray, 2010). Audit trails are helpful for organizing the information found within an audit.
Biblical Integration
Thessalonians 4:11 states to “and to make it your ambition to lead a quiet life: You should mind your own business and work with your hands, just as we told you” (NIV). When working within sensitive databases, it is important to be mindful of the meaning behind access to specific data. Going outside of defined access or misusing given access is an improper use of database access. Within many practices from personal to professional, it is important to complete tasks assigned without intruding on others. Having systems in place to ensure the database is not misused is helpful for ensuring everyone is adhering to the access within their scope.
References
Bakir, C., & Guclu, M. (2022). Multi-level security model developed to provide data privacy in Distributed Database Systems. Tehnicki Vjesnik – Technical Gazette, 29(2). https://doi.org/10.17559/tv-20200516084319
Murray, M. (2010). Database Security: What Students Need to Know . Journal of Information Technology Education, 9, 61–77.
The Gideons International in the British Isles. (2012). The holy bible: New international version.
Zhu, Y., Wu, X., & Hu, Z. (2022). Fine grained access control based on smart contract for Edge Computing. Electronics, 11(1), 167. https://doi.org/10.3390/electronics11010167
Post 2:
Databases are some of the most useful components within a website, application or system. Databases often times are tasked with storing all of the information that an organization needs to operate in an efficient manner. They handle the storage of customer info, names, products, and much more, making databases a significantly large part of the overall information technology infrastructure.
Topic 1
Databases are often times tasked with allowing information to be changed by multiple users with a varying amounts of access privileges(Murray, 2010). In order to achieve this goal, databases utilize “Access controls”. Access controls play a key role in protecting the data within the database by allowing only a predetermined set of actions to be carried out by predetermined users. There are three levels that makeup user access controls in the traditional database setup, a username and password, defined privileges or roles, and defined privileges. These three methods of access control within the database are often deployed together in order to create a more complete access control security protocol.
Topic 2
When it comes to accessing a database, most users will never actually see where the database is managed from. Most of the interactions that the general person has with a database are through an intermediary, such as a web application. Securing the users ability to interact with that database through a web application requires additional security manipulations(Pernul,1984). The process that is most commonly used in setting up databases is the CRUD method. This method is designed to be utilized in setting up security protocols for databases that need to interact with a web app.
Cyberattacks have been on a dramatic increase over the last few years, resulting in chaos within the cyberspace. As a result of these attacks databases have been a primary target for hackers and cybercriminals. In recent, we have seen a large number of data breaches in the news affecting even the largest of companies.
One of the largest and most impactful data breaches happened in 2018 to the Marriot Hotel chain. In this data breach over 500 million customers’ personal information was released. The cause of this attack stimmed from the hackers having access to an acquired companies system that would then be merged with the Marriot system
References
Bertino, E., & Sandhu, R. (2005). Database security-concepts, approaches, and challenges. IEEE Transactions on Dependable and secure computing, 2(1), 2-19.
Murray, M. C. (2010). Database security: What students need to know. Journal of information technology education: Innovations in practice, 9, IIP-61.
Pernul, G. (1994). Database security. In Advances in Computers (Vol. 38, pp. 1-72). Elsevier.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Wridemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Place Order” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.