Databases have become an influential part of personal and professional settings in modern society.
Write answers for the following statements.
Post 1:
Database Security
Databases have become an influential part of personal and professional settings in modern society. Maintaining security within databases is essential to protect the integrity of the database and the privacy of the data. Database security “strives to ensure that only authenticated users perform authorized activities at authorized times.”(pg.62). Database security “…should not be only thought of as capturing of information but also as avoiding the violation of particulars such as integrity, availability, and confidentiality.” (Bakir, & Guclu, 2022). Understanding database security and the techniques that support security are important steps in database development and management. Two of the topics that Murray (2010) identified that will be discussed within this post are access control and auditing. Other topics Murray (2010) mentioned for database security include: vulnerability, application access, and inference (Murray, 2010).
Access Control and Auditing Mechanisms
Access control “is the process by which rights and privileges are assigned to users and database objects.” (Murray, 2020, pg.61). Controlling access helps to limit access to data through authentication, assigning rights, and authorization practices (Murray, 2010). Access can be granted or restricted to databases, tables, columns, or rows through access control (Murray, 2010). Zhu, et.al., (2022) identified some outdated practices within access control and started edge computing which uses cloud services and “real-time migration” to achieve efficient access control and security (Zhu, et.al., 2022). The concerns Zhu et.al. (2022) identified with older models of access control is that they have centralized authorization which can create a single-point failure within the system (Zhu, et.al., 2022). Auditing mechanisms “tracks database access and user activity providing a way to identify breaches that have occurred so that corrective action might be taken.”(Murray, 2010, pg.61). Auditing is useful for determining who accessed the database, what was changed, and what actions were carried out to help identify breaches within the system (Murray, 2010). Auditing can look like viewing logon attempts, changes in users, changes to database structure, changes to data, or errors that occurred within the database (Murray, 2010). Audit trails are helpful for organizing the information found within an audit.
Biblical Integration
Thessalonians 4:11 states to “and to make it your ambition to lead a quiet life: You should mind your own business and work with your hands, just as we told you” (NIV). When working within sensitive databases, it is important to be mindful of the meaning behind access to specific data. Going outside of defined access or misusing given access is an improper use of database access. Within many practices from personal to professional, it is important to complete tasks assigned without intruding on others. Having systems in place to ensure the database is not misused is helpful for ensuring everyone is adhering to the access within their scope.
References
Bakir, C., & Guclu, M. (2022). Multi-level security model developed to provide data privacy in Distributed Database Systems. Tehnicki Vjesnik – Technical Gazette, 29(2). https://doi.org/10.17559/tv-20200516084319
Murray, M. (2010). Database Security: What Students Need to Know . Journal of Information Technology Education, 9, 61–77.
The Gideons International in the British Isles. (2012). The holy bible: New international version.
Zhu, Y., Wu, X., & Hu, Z. (2022). Fine grained access control based on smart contract for Edge Computing. Electronics, 11(1), 167. https://doi.org/10.3390/electronics11010167
Post 2:
Databases are some of the most useful components within a website, application or system. Databases often times are tasked with storing all of the information that an organization needs to operate in an efficient manner. They handle the storage of customer info, names, products, and much more, making databases a significantly large part of the overall information technology infrastructure.
Topic 1
Databases are often times tasked with allowing information to be changed by multiple users with a varying amounts of access privileges(Murray, 2010). In order to achieve this goal, databases utilize “Access controls”. Access controls play a key role in protecting the data within the database by allowing only a predetermined set of actions to be carried out by predetermined users. There are three levels that makeup user access controls in the traditional database setup, a username and password, defined privileges or roles, and defined privileges. These three methods of access control within the database are often deployed together in order to create a more complete access control security protocol.
Topic 2
When it comes to accessing a database, most users will never actually see where the database is managed from. Most of the interactions that the general person has with a database are through an intermediary, such as a web application. Securing the users ability to interact with that database through a web application requires additional security manipulations(Pernul,1984). The process that is most commonly used in setting up databases is the CRUD method. This method is designed to be utilized in setting up security protocols for databases that need to interact with a web app.
Cyberattacks have been on a dramatic increase over the last few years, resulting in chaos within the cyberspace. As a result of these attacks databases have been a primary target for hackers and cybercriminals. In recent, we have seen a large number of data breaches in the news affecting even the largest of companies.
One of the largest and most impactful data breaches happened in 2018 to the Marriot Hotel chain. In this data breach over 500 million customers’ personal information was released. The cause of this attack stimmed from the hackers having access to an acquired companies system that would then be merged with the Marriot system
References
Bertino, E., & Sandhu, R. (2005). Database security-concepts, approaches, and challenges. IEEE Transactions on Dependable and secure computing, 2(1), 2-19.
Murray, M. C. (2010). Database security: What students need to know. Journal of information technology education: Innovations in practice, 9, IIP-61.
Pernul, G. (1994). Database security. In Advances in Computers (Vol. 38, pp. 1-72). Elsevier.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.