Preview

Nt1330 Unit 3 Assignment 1 Security Level Analysis

Good Essays
Open Document
Open Document
767 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 3 Assignment 1 Security Level Analysis
layers of
Server Domino has multilevel security. The highest security level can be achieved when you work with Domino server, using Lotus Notes (‘thick’ client). IBM says about seven security levels the following:

• Network – this level works with network side (physical possibility); • Authentication – the process for “trust” connection establishing between the server and the applier; • Domino Server Security - this level deals with server documents access rights; • Database Access (ACL) - this level provides user access control to specific database; • Design Element Security - this level corresponds to limitations stated in access control list for design element (i.e. who may work with this design element).
…show more content…
On Domino Server Security level in Server document stated rather big list of security parameters (starting from users group description to whom it is allowed or not working with the server till users which are server administrators with full rights allowed working with the server’s databases, omitting the next four security levels. Database Access (ACL) is installed independently for each Lotus Domino database and has seven main access levels:

• Manager – user/users group with access rights to change all database information, including database ACL, replication and local encryption settings; • Designer - user/users group with access rights to change all database information, including data documents and design elements; • Editor - user/users group with access rights to change database data documents; user/users group with access rights to change • Author - create new and change his documents; • Reader - user/users group with access rights to read database documents; • Depositor - user/users group with access rights to create database documents and not view them afterwards (excluding, possible, Public

You May Also Find These Documents Helpful

  • Good Essays

    This group will be given limited access, not allowing for any changes to workstation unless authorized by System Administrator.…

    • 308 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Use least-privileged accounts, consider the granularity of access, enforcing separation of privileges, secure the system resources against system identities DB system having multiple administrators…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Database Concepts Pt2520

    • 326 Words
    • 2 Pages

    2. FALSE You only need to include the most important stakeholders in the database discussions.…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Pm3110 Unit 1 Paper

    • 529 Words
    • 3 Pages

    • Data Administrator – control the access permissions and privileges, install the new DBMS, data available in consistent form, provide scope for data recovery and data security…

    • 529 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Week 2 Individual

    • 852 Words
    • 3 Pages

    To create a database environment for Smith Consulting so they can track their consulting staff, each staff’s member skill sets, and what projects they are working on, they require the installation of a databases setup such as, Microsoft SQL Server, DB2, or Sybase in their machines as well as a separate server room for the database to maintain the connections and servers. To handle this database environment, the Smith Consulting also requires database administrators for each database who can maintain the database at every situation and make it easily accessible to the users who are working on it. (Verdiem Corporation, 2014) This is a kind of decision making process is one in which the management needs to decide which server they need to install so that they achieve the above mentioned goals within the organization. Let’s assume the management installed the Oracle database environment in their machines as well as in the separate database room. Now it is responsibility of the database administrator to properly handle the database environment so it is mostly recommended by all of the DBA’s to install the database server at a remote location which makes it less likely to be hacked and adds stability while using it. Another important role of the DBA is to have proper access to the database and based on the requirements and specifications to assign the permissions for the database to the management such as read, write and execute permissions. This will create the scenario of giving write permissions to the HR department which normally handles the new and old employees staffing. Now the HR department will update about the staff’s projects which means, which employees are allocated to which project and which employees are yet allocated to any projects. Write permissions are also given to the managers of every…

    • 852 Words
    • 3 Pages
    Better Essays
  • Good Essays

    True False

    • 378 Words
    • 2 Pages

    12. User access refers to what objects and data in a database a user has permission to use.…

    • 378 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Database Sql Server

    • 328 Words
    • 2 Pages

    User access refers to what objects and data in a database a user has permissions to use. True…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Also, being able to share that data out to whoever is given access to. There should be firewalls setup throughout the database restricting unwanted visitors. Giving access and restricting permissions to certain areas of that database is a big part of managing that data. There are specific areas inside the database you don’t want personnel to access due to unknowing or accidental corruption of that data. A good example is, being part of ship’s personnel and not being able to change or edit parts of the MIDB. If everyone had access to change or edit everything, there would be no database management or use for a Database Manager (DBM). One of a DBM’s jobs is to manage a user’s permissions that access a specific database. It would be catastrophic for everyone to have administrative permissions to a database. A good example of why every user shouldn’t have access to make changes would be, a user accidentally deleting a critical file from MIDB that another ship is accessing or needs to access. This user having no clue what he/she did, let alone the loss of data another ship needed is…

    • 758 Words
    • 4 Pages
    Good Essays
  • Better Essays

    One key advantage of a database management system is that it is secure. First and foremost on the minds of an organization is security. This type of system is managed through a DA (Database Administrator). This person sets limits on accessibility, which means not all employees, or customers can access all levels of information within the database. The first line of defense is to allow access to a computer only to authorized, trusted users and to authenticate those users by a password or similar mechanism (computer science. (2013). In Encyclopedia Britannica. Retrieved from http://www.britannica.com.libdatab.strayer.edu/EBchecked/topic/130675/computer-science).…

    • 864 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Project Proposal for Cms

    • 500 Words
    • 2 Pages

    On a network, access to databases is dependent upon the number of Users with User ID's and protected passwords.…

    • 500 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Head First

    • 1831 Words
    • 8 Pages

     Each access level and its tasks are different. A staff member cannot access the…

    • 1831 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    There will be 4 types of users who can access this application and will be able to add, delete or update information as per the Privileges and rights. Following types will elaborate that which type of audience will fall in which type of category.…

    • 1780 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Lab #3

    • 610 Words
    • 4 Pages

    for access controls. The Active Directory users and workstation plug-ins will be used to create users, groups,…

    • 610 Words
    • 4 Pages
    Good Essays
  • Good Essays

    jdbc

    • 1262 Words
    • 6 Pages

    To create database objects, we must create at least one database user. A user is associated with a database schema, you connect to the database as a database user, and the database user is the owner of any database objects (tables, views etc) that you create in the…

    • 1262 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Concurrency  Several users may have simultaneous access to the database. Access via views  Each user has a limited “window” through which the appropriate part of the database is viewed. Authorization  The access privileges of each user will be limited in a specific way.…

    • 1174 Words
    • 5 Pages
    Powerful Essays