StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Implementing Database Security - Assignment Example

Cite this document
Summary
The assignment "Implementing Database Security" focuses on the critical analysis of the major issues in implementing database security. First, Microsoft added a feature of compatibility with Power View Reports against Multidimensional prototypes…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Implementing Database Security
Read Text Preview

Extract of sample "Implementing Database Security"

Fourth, the 2014 MS SQL server also has SQL Server Data Files in Windows Azure facilitating the integral compatibility for SQL Server database files stored as Windows Azure Blobs. With these features, users of the 2014 MS SQL server will be able to form a database in an SQL Server operating on-premises or in a computer-generated device in Windows Azure with a developing storage site and the users’ information in Windows Azure Blob Storage. Each of these features works well in contrast to the former SQL Server by Microsoft (Natan, p. 74).

I can ensure that the DBMS operates in a consistent overall secure environment by first checking whether the DBMS setting on which it is operating is at maximum capacity and output. Assuring optimal capacity enables me to store the file and its sensitivity degree in the database (Natan, p. 223). As a result, the DBMS makes sure that only authorized users can read or edit the file. Second, I can make the DBMS multi-level so that it can with similar authorization ranges. Afterward, I can store the file at any location because it is presumed that the location can process the information that agrees upon. Third, the DBMS is at a multi-level, I can make it handle the authorization ranges differently. This way, the file stored at a given location can be authorized to read or edit the degree of the file (Natan, p. 223).

An example of how buffer overflows can make databases susceptible is a program composed in a language that tolerates or even facilitates buffer overflows (Natan, p. 24). Occasionally, such a program can depend on another program composed in a language that facilitates buffer overflows. Such a program will replicate information from a single stream on the stack to another without initially testing their sizes (Natan, p. 24). This program does not employ methods like canary values or non-applicable stacks to stop buffer overflows. At this point, is very possible that the database accommodating this program is susceptible to external intrusion. Programs regularly distribute memory buffers to store various kinds of information. For instance, the program requests entry input and distributes a buffer to accommodate provided input (Natan, p. 25).

C2 Security is a federal evaluation for security wearing the network has been qualified for flexible resource security and auditing abilities. For instance, the SQL Server has a C2 accreditation. However, this accreditation is just binding for a given assessed configuration (Natan, p. 33). C2 Auditing the tracing of audit incidents and data and storing them in a file in a default directory. If this file grows to a size cap of 200 MB, C2 Auditing begins a new file, saves and shut down the previous one, and it all the newly audited information in the new file. C2 Security is important because it must be fixed in the SQL Server in line with the assessed configuration or the user will fail to confirm that he or she is operating a C2-level system (Natan, p. 33). C2 Auditing is important because users cannot toggle the system-admin functionality without it. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Assignment Example | Topics and Well Written Essays - 500 words - 1”, n.d.)
Security Assignment Example | Topics and Well Written Essays - 500 words - 1. Retrieved from https://studentshare.org/information-technology/1686297-security
(Security Assignment Example | Topics and Well Written Essays - 500 Words - 1)
Security Assignment Example | Topics and Well Written Essays - 500 Words - 1. https://studentshare.org/information-technology/1686297-security.
“Security Assignment Example | Topics and Well Written Essays - 500 Words - 1”, n.d. https://studentshare.org/information-technology/1686297-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Implementing Database Security

Methods for Database Security

This paper introduces the issue of database security in an organization by introducing the need and importance of database security.... This paper introduces the issue of database security in an organization by introducing the need and importance of database security.... The core point in database security is the restriction of unauthorized access into databases, which can be done in a number of ways.... This means that database security is mainly concerned with protecting the database from unintended activity, be it from insiders, outsiders, or unwanted programs....
10 Pages (2500 words) Essay

Database Design and Implementation

In addition, the report also discusses various security issues that can be considered while creating very large databases.... This Report presents a detailed overview of analysis, design and implementation of database for Assignment and Relocation Office (ARO) using SQL SERVER.... The above assumptions and business rules are transferred into an enhanced ER data model as shown in below figure: Fig: ER model for ARO database schema c....
13 Pages (3250 words) Coursework

Software Implementing Database Security

The paper "Software Implementing Database Security" describes that SOA systems now consider data provenance and integrity of routed data in the system.... The vulnerability to database security includes unauthorized access by hackers or outside attacks or misuse by authorized personnel which are database users, administrators, or system managers.... Data integrity can also be implemented through other ways than database security where different error checking and validations must be checked to provide accuracy of data....
4 Pages (1000 words) Essay

Database security issues

This paper seeks to discuss some of the database security issues that are threaten to compromise the information stored by organizations.... However, with the growth in database systems' demand, security issues concerning the safety of.... There has been a rapid growth uptake of cloud computing and hence database systems that are web The paper analyzes security issues concerning both web based and traditional databases.... atabase inference is a security issue that multi level databases are prone to....
5 Pages (1250 words) Research Paper

RCP 3 Chapter 3

This measure is appropriate because a larger number of malicious users of database systems are found among this user category (Meghanathan & CNSA, 2010).... In view of the numerous information assets that it already owns, Data Mart has no reason to be left out of the organizations already embracing the principle of least privilege....
3 Pages (750 words) Coursework

Health Insurance Portability and Accountability Act

DDL instructions are most likely the most destructive instructions today and allow intruders to compromise any network with absolution from a security point of view.... More specifically, Ben Natan anticipates DML audit trails by choosing to form them for a subsection of the database tables presented and given login details (Natan, 2005, p.... In his essay, Abrams uses a new model that appears to be an ingredient in an oversimplified database structure....
4 Pages (1000 words) Essay

Database Security Controls

However, we can see that with all the changes and innovations, the risk on security of the databases is a new challenge and constant concern for everybody in our time.... This paper also outlines the damage, the breach in the security in database can cause.... he aim of this research is to analyze the current attacks and to assess the security of corporate databases and the related issues which are increasingly becoming significant as enterprises are growing and considering the data they have stored in them....
12 Pages (3000 words) Literature review

Information Security Audit Tools

As the paper "Information security Audit Tools" states, when audit systems are adopted, they assist to prevent the attacks and reduce their associated consequences.... The large chunks of information create security risks that have major effects on the information itself, operations, supporting infrastructure, as well as, to the computer systems in use.... elow shows information security management.... : Information security management....
10 Pages (2500 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us