DATABASE SECURITY AND ADMINISTRATION
I. Meaning of Database Security and Administration
Database Security is the ability that involves protecting, securing and controlling of data stored in the database against an unauthorized access towards data. Database security provides methods that control data stored in the database against outside intrusion and unauthorized.
Database Administration is the method of controlling the database so that the database user can access, retrieve, update, delete and alter data from the database. The person who controls who can access which part of the database is called a Database Administrator. The database administrators is responsible for installing and improving, modify the database structure, backup and recovery of the database.
Database Security and
…show more content…
Roles of the Database Management System
The Database Management Systems provides many roles towards managing and controlling the Database. Among of the roles provided by the Database Management Systems are as follows:
1. The Database Management Systems facilitate easy management of data since data of the same category are always stored together. The Database Management Systems facilitate data security, through the access control provided to individual on which data should be accessed by which group. Example Managerial data in the bank should be accessed by Bank Managers, Customers Account Information should be accessed by Customers and Bank Accountants, IT information should be accessed by Information Technologist Personnel.
2. The Database Management System minimizes data inconsistence .In database data inconsistence is removed by the primary key, the primary key enable data to be recorded once without being duplicated several time in the database tables.
3. The Database Management System improves decision making within an organization where by each individual gives his or her views and later all views are collected and analyzed through and later final decision is
What are the exact features of a distributed database? a) Is always connected to the internet b) Always requires more than three machines c) Users see the data in one global schema. d) Have to require the physical location of the data when an update is done
A “page” will be a single Control, Risk, Audit Test, etc. 4. Is there a separate security level available for a system administrator? Yes. As described above in Technical Capabilities #2, Site Administrator is the policyIQ role assigned for this purpose.
They also handle all aspects of information security. This includes teaching others about computer security, inspecting for security violations,
The eight access rights include the creation and deletion of object, subject and access rights for read, grant, delete, and transfer. The area that was limiting within this model was associated with the defining a system of protection. This
1. Installing antivirus software on all the systems, for example Norton antivirus. 2. Installing antivirus and anti spam software on email servers, examples of antispam software include: 3. Install antivirus and content filter software on firewalls 4.
The Information Security Manager reports in their capacity to the CEO. Company officers, executives, directors, employees, contractors and third party service providers cooperate and work with the Information Security Manager to ensure the protection of customer’s non-public information and Licensee’s Information Assets. Policies, such as Enterprise Antivirus Program, Network Access, Software Development Security Standards, Physical Security, Vendor Manangmenet Ativirus, Mobile Computing/Remote Access, Inromation Security Risk Assessment, Social Media, Data Loss Prevention, and Secuiryt Incident Response Policies have been implemented to protect customer’s non-public personal information and company Information
Having security basically means that the data is safe from unauthorised or unexpected access, modification or deletion of files. Due to the vast majority of files being stored on a form of electronic device in the modern world, it is the job of the company, in this case Tesda, to ensure that access is limited to certain individuals and that they pose no threat to the company. Although there are many ways of accessing this information illegally, Tesda should concentrate on protecting against the most common types like viruses and system failure etc. Ensuring that there is a backup server is essential as this information is what keeps the business running and losing it will have a massive impact on them. Within Tesda, it will be the role of the management to assess who should and shouldn’t be granted access to particular bits of information and whether or not they will have it as read only or being able to edit the document.
Again, the data owner has the ultimate responsibility for managing the access controls, but does not need to have his/her hand on the controls daily. Instead, the data owner can have an appointed data security officer to handle the day-to-day access and maintenance of data control (Khatri & Brown, 2010, p. 167). This position will determine the levels at which each employee in the company can access the data for particular reasons. This includes limiting executives to various levels, with the understanding that their access should be for retrieval purposes, not for manipulation
Access is a database management system that allows users to create a database, add, change and delete data. Outlook is an app were users can communicate with others and organize
The information or data that needs to be stored could relate to personal employee information that would need to be password protected so only the relevant people can gain access. Only if date if stored in a procedural manner can it be easily retrieved. This can also help if an external body needs to gain access to records for example auditors. Describe the features of different types of systems used for storage and retrieval of information. There are many different ways in which you can store and retrieve information; the main purpose of storing any information is for easy retrieval in the future when it is
1. Define the following terms: GIS; A geographic information system is system made to capture, store, manipulate, analyse, manage, and present spatial or geographical data. FOSS; Free or Open Source Software. FOSS programs have licenses that allow users to freely run the program for any purpose, modify the program as they want, and also to freely distribute copies of either the original version or their own modified version. ILWIS; Integrated Land and Water Information System is a GIS / Remote sensing software for both vector and raster processing.
This module and coursework requirements were directed to present some crucial and effective experience for me. During the entire course, I had learnt a number of different learning, which can be proved quite helpful for me to build a successful and attractive career ahead. I can present the significance of the coursework activities done in terms of my learning from this subject. The reflection of the coursework learning can be presented as below: Problems faced during the research work: Although I have been able to finish my coursework requirements within the time frame.
In a relational database management system the data access is privileged which means that the database administrator has the authority of giving access of data to some particular users which makes the data secure. 3. Easy to use: This type of database uses tables which is better and easy to create and use. Disadvantages of RDBMS: 1. Slow:
Accounting information system has many functions in management and the importance. The most important is with wide-spread automatization can relate to accounting work processing. Accounting software packages have many software programs for supporting book-keeping, reporting, recording economic events or processing. Accounting software packages can support the activity of the enterprise for to update and integrated information system. Besides, the definition of accounting is as a system at the micro level that have process, procedure, rule and activities of an information system that need follow by the success of the enterprise to achieve the goals.
MANAGEMENT INFORMATION SYSTEM 1. Management information system is an organized portfolio of a precise system for getting, processing, and giving information in anchor of the business operations and management of an organization. Types of Management system that is able to employ competitive advantage: • Transaction processing system for operational data processing that is desired, for example, to register consumer orders and to outturn invoices and payroll. • Management reporting systems competent of making reports for limited time periods, designed for managers culpable for limited functions in a firm. • Decision support system expressly designed for the support of individual and conjoint decision making.