StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Database Configurations - Assignment Example

Cite this document
Summary
Running Head: Database Configurations Database Configurations Multiple Database Configurations in an Organization The importance and usage of a database in an organization cannot be undermined…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.1% of users find it useful
Database Configurations
Read Text Preview

Extract of sample "Database Configurations"

Running Head: Database Configurations Database Configurations and Section # of Multiple Database Configurations in an Organization The importance and usage of a database in an organization cannot be undermined. The basic purpose for any database in an organization is to serve the purpose of storing transactions and being able to produce reports effectively (Rob & Coronel, 2002). Although, most database analysts would agree with this simplistic definition of a database, there is more to uses of a database than what meets the eye in this definition.

Most organizations do not rely on a single database configuration to be followed across the board. The purpose of having multiple database configurations and settings is similar to the principle of hedging or diversifying risk – the multiple configuration serve as barriers to employees who wish to internally cause damage, collect data about the company or use the information for unauthorized purposes (like selling to a third party). Multiple database configurations can come in various forms: having dedicated database servers, multiple platforms like SQL, Oracle and MySQL and a mix of the above.

The idea is that organizations and their IT managers feel safer when information and their data sources are scattered across various configurations. This allows them to reduce the risks of data losses and hacking. The former is avoided because if there is a data failure, then it is likely to be restricted to the particular configuration only due to the fact that multiple configurations are often needed to be enforced across different physical data sources. As for hacking it is important to have different configurations because it restricts the success of hackers, viruses and other automated attempts to gain unauthorized access to data.

Enforcing such configuration variations at the database level will ensure that any attempts from an external world to gather control over an organization’s data source will have to go through several complex configurations. Organization’s also enforce different configurations to enforce rights within an organization: employee-level, group-level and enterprise-level. Different configurations in such a situation mean that the data available to a particular person in an organization is limited to the extent defined by the rules and authority to which that employee belongs.

It also helps to keep track of and pinpoint any data breach issues upfront within the least possible time (Rob & Coronel, 2002). Such configurations also assist managers to make different data available to different employees within their departments without having to worry about complex configurations – managing roles is done easily through initial configurations and leaves little room for loopholes to be exploited by most save the tech-savvy employees. It can however, be also considered as a flaw in times when there are changes in an organization – merging data sources and overlooking changes is a difficult process but of course the positive side is the high level of security that an organization can benefit from by implementing multiple configurations.

It can thus be summarized well that organizations indulge in setting different database-level configurations because it provides them an edge in both internal and external security. Security and restricting data to relevant employees by means of roles allows an organization the liberty of keeping its sensitive information within the confinement of its secure databases. In addition, it allows IT managers to regularly identify the pros and cons of different configurations so that in the long-term the best configurations can be identified and adopted (Roddman & Jeremy, 2003).

Therefore, the adoption of multiple database configurations across an organization will result in a highly secure environment with added challenges to hackers and malicious users trying to gain unauthorized access to data, information or control over systems. Bibliography 1. Rob, P., & Coronel, C. (2002). Database System, Design, Implementation & Management Fifth Edition. Thomson Learning. 2. Roddman, S., & Jeremy, I. (2003). Database Structures and Grouping. London: Oxford Publishers.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Database Configurations Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved from https://studentshare.org/other/1413900-database-configurations
(Database Configurations Assignment Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/other/1413900-database-configurations.
“Database Configurations Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/other/1413900-database-configurations.
  • Cited: 0 times

CHECK THESE SAMPLES OF Database Configurations

Binary Large Object and Transaction Processing Council

In addition to not considering BLOBs, the TPC and SPC benchmarks are implemented by vendors who perform many specialized database and operating system configurations.... These nonstandard configurations take advantage of the vendors' specialized knowledge of the hardware, database, operating system and benchmark.... hellip; One obvious medium that is used to quickly access and store these electronic documents is the database.... The storage and retrieval of these items can be accomplished through a database system using a column type capable of storing binary data (commonly referred to as a "binary large object" or a BLOB)....
4 Pages (1000 words) Essay

Database Management System Assignment

sers will be able to determine the performance of different accessible system configurations (hardware, database and operating systems).... This thesis provides a benchmark to assess the performance of storing binary large objects (BLOB) in a relational database management system.... benchmark framework that reduces development and integration costs of benchmarking the database performance of a specific application is included.... The benchmark is platform independent and can be extended to support any database vendor providing a Java data source for connectivity....
19 Pages (4750 words) Assignment

The Security Risks Associated with Online Access to Databases

Besides these, other technological solutions are 'hardening' the database using features provided by the database vendor, and keeping out non-essential items from the server, including documentation, sample configurations, code files and if possible built-in stored procedures that are unused.... hellip; The author states that database administrators and application developers usually don't know much about security while security personnel usually don't know much about the needs of database users....
2 Pages (500 words) Essay

Network Configurations

hellip; A VLAN is important in that it addresses issues of security by restricting access to the sensitive information, it eliminates the need of purchasing additional expensive network equipment, and it also increase the Standardized configurations across the Network Replace with DeVry NETW206: Introduction to Switching Submitted Your professor's nameDate: Current dateStandardized configurations across the networkA Virtual LANs otherwise known as a VLANs which are usually defined within switches, are broadcast domain that control broadcast, multicast, and unicast within a device in layer 2....
2 Pages (500 words) Essay

Logical and Physical Structures of the Database

The paper "Logical and Physical Structures of the database" analyzes communication mechanisms.... Every database instance is connected to the only existing one b=database.... hellip; Connection in a database instance is the communication that occurs between the instance and the user process.... Session in a database instance, on the other hand, is the specific connection of a database user to an instance through the database user process that it stands for in the current user login to the instance....
18 Pages (4500 words) Assignment

Automatic Storage Management for Oracle database 11g

This term paper "Automatic Storage Management for Oracle database 11g" presents a detailed analysis of oracle automatic storage management for Oracle 11g.... In addition, Oracle Automatic Storage Management is responsible for managing groups of data storage in disk groups that can collect and store database files from a number of databases.... nbsp; In Oracle 11g, Automatic Storage Management (ASM) is designed to simplify the management of Oracle related files by facilitating the database administrators to reference disk groups instead of files and disks separately, which can be administrated through automatic storage management....
10 Pages (2500 words) Term Paper

Information Technology Security Management and Its Impact on Business Success

… 10th, December, 2009PART ACurrent SituationScheduled Objectives:This project has several objectives all which if accomplished produces an appropriate secure infrastructure design for H&R.... Several of the objectives have been met but there are 10th, December, 2009PART ACurrent SituationScheduled Objectives:This project has several objectives all which if accomplished produces an appropriate secure infrastructure design for H&R....
12 Pages (3000 words) Thesis

Database Management Systems

… The paper “database Management Systems” is an excellent example of a case study on information technology.... IBM has developed a number of relational database management systems.... The paper “database Management Systems” is an excellent example of a case study on information technology.... IBM has developed a number of relational database management systems.... The database stores data physically using data files and logically using tablespaces....
12 Pages (3000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us