Wednesday, June 24, 2020

Security Layers and Database Management System - 550 Words

Security Layers to be Implemented for a Database Management System (Essay Sample) Content: NameLecturerà ¢Ã¢â€š ¬s nameCourse numberDate (date month year)Security Layers to be Implemented for a Database Management SystemIn this information age, data is a vital asset. Corporation and Organizational concern on database security therefore increases exponentially each passing moment. Database management together with other information assets has become part of the key areas affecting companies today. When compromised or exposed to attackers, information can cause significant negative effect on the business, company reputation or even bring down a whole corporation. In order to avoid all these, database management systems must be protected at all costs. This paper aims at discussing various security measures/layers to be implemented for database management systems in networked corporationsSecurity strategies must focus on avoiding all forms of risk. A security strategy must mitigate the overall possibility of harm or loss of companies data ( Baccam 2). To des ign such a system, system requirements and spectrum of threats to the data must be understood and controls implemented to protect people, processes and the technology in terms of information within an organization. Some of the security layers implemented include access control, logical control(auditing, authentication, encryption and passwords), integrity controls, backups and data recovery strategies together with application security.Many database systems have been secured from hackers through security measures such as firewalls and intrusion detection systems. However, access to programs and data within these systems continues to be at stake with growth in the internet networking i.e. internet access. Access controls not only protect against external and internal attackers, they can also protect from the mistakes that users introduce( Baccam 7). A good example of such a case is a user who deletes an important object on the assumption that it is not in use. To curb this, many orga nizations develop their own " baseline" security standards and designs detailing basic security measures for their database management systems(Database security ). Some of the measures to be implemented are good laws and regulations, policies and accepted practices concerning privacy, accounts and company reports. a paper on ways to secure stored data recommends implementation of multiple layers of defense for protection in case one of the perimeters is compromised(Schulz 1).Logical controls and security will involve securing the networks with firewalls, running antispy-ware and virus detection programs on servers and storage systems. Without strategies like logic unit number mapping, encrypting and decrypting of data in transit and at rest, use of passwords and usernames, stored data is vulnerable to unauthorized or disruptive access. Auditing of adm...

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.