Nt1330 Unit 1 Assignment

Powerful Essays
Database Security
Wilmington University

Table of Contents

Table of Contents 2
Abstract 3
Database Security 4
Physical Security 4
Security threats to Database 4
Numerous layers and data security controls are related to databases as follows 7
Assessments of vulnerabilities and Compliance 8
Conclusion 11
References 12

Abstract
This paper gives an idea regarding the important aspects of the database security. It mainly focuses on the security parameters such as confidentiality, authenticity and availability of the data. It also explains the different threats for the security in an organization in relation to the database. The basic steps which are required to control the loss of data are explained in detail. Among the controls the encryption process is the one which has to be followed to control the access into an
…show more content…
They may even share their login id and password with others. It is better if the IT members create software which asks certain questions before they log into the data.
Stage Vulnerabilities
Vulnerabilities in the computers may be due the unauthorized access of the person to corrupt the information in the system related to the database, some may also format the databases where upon usage they can easily hack the information. For example, the Blaster Worm abused a Windows 2000 feebleness to make foreswearing of association conditions.
Induction
Undoubtedly in secure DBMS, it is feasible for clients to draw gatherings from the data they get from the database. The employee working in an organization when gets certain information they may try to elaborate it or draw some important aspects related to the database from past. There are two crucial events of the finding issue, which ordinarily climb in database systems.
SQL

You May Also Find These Documents Helpful

  • Better Essays

    One key advantage of a database management system is that it is secure. First and foremost on the minds of an organization is security. This type of system is managed through a DA (Database Administrator). This person sets limits on accessibility, which means not all employees, or customers can access all levels of information within the database. The first line of defense is to allow access to a computer only to authorized, trusted users and to authenticate those users by a password or similar mechanism (computer science. (2013). In Encyclopedia Britannica. Retrieved from http://www.britannica.com.libdatab.strayer.edu/EBchecked/topic/130675/computer-science).…

    • 864 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    The team began to consider how to prioritize security for the RDBMS to function. The RDBMS should be designed in a way that can offer security and protection to every piece of data saved within the architecture. This is crucial in assuring that the business remains competitive and meets client/customer confidence that sensitive data will not be exposed. These expectations could be meet only if users are sure that information being shared has not been altered or breached.…

    • 1329 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    | Keep information secure and manage personal access to information sources securelyProtect systems and data: Access controls: Physical controls: log-in details should be treated as credit card information and not to be left lying anywhere with an easy access, locks, passwords, access levels.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 3253 Words
    • 14 Pages

    For this you need to edit the /etc /network/interfaces file and you need to add the…

    • 3253 Words
    • 14 Pages
    Powerful Essays
  • Best Essays

    Nt1310 Unit 1 Assignment

    • 4486 Words
    • 18 Pages

    P2P networks positively affect property rights. In reference to property rights, it enables those who create the…

    • 4486 Words
    • 18 Pages
    Best Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    Is a process of identifying a user and about verifying whether someone is who they claim to be. Typically, authentication is achieved by the user sharing credentials that somehow verify the user's identity. It usually involves a…

    • 711 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1330 Unit 1 Assignment

    • 521 Words
    • 3 Pages

    I learned that sometimes you do not know what you are capable of doing until you try it. By learning everything that is involved in the creation of algorithms you can make sure that any program issue you encounter you will be able to address it.…

    • 521 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 1436 Words
    • 6 Pages

    Download this document to your computer before filling it out. Each of the responses below should be appropriately filled in and the document saved again before submitting to the Unit 1 Dropbox. Be certain to answer each question completely.…

    • 1436 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Assignment

    • 428 Words
    • 2 Pages

    Technology is the practical application of science to commerce or industry. It plays an important role in people's lives through home, school, medical, and business uses. Smartphones have become more and more necessary to people's life demands. A smartphone is a mobile phone built on a mobile computing platform with more advanced computing ability and connectivity than a feature phone. It affects on people, relationships and society in both good and bad ways. However some people have allowed the phone to overtake their lives. I interviewed two of my class mates, as well as my daughter on their uses of their smartphones. And this is the information I have gathered.…

    • 428 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 1 Assignment

    • 4699 Words
    • 19 Pages

    A critical analysis of an individual child’s observed learning behaviour during a teaching session and analysis of the implications for their further learning and their support needs (i.e. the TA’s possible role in supporting and developing further learning) (1500 words)…

    • 4699 Words
    • 19 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 604 Words
    • 3 Pages

    6. What is the basic unit of information in an LDAP directory? What is the…

    • 604 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    The satisfaction and euphoria that accompany the successful completion of any task would be incomplete without the people who made it possible, whose constant guidance and encouragement crowned our efforts with success.…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    • Describe the basic framework or make-up of any database. Discuss what makes databases important as well as a major target to hackers.…

    • 392 Words
    • 2 Pages
    Good Essays