Database Security

663 Words Jan 31st, 2015 3 Pages
CTU
Lance Robinson
CSS330-1501A-01
Database Security
Individual Project 3
Instructor: Anita Arceneaux
1/26/2015

Table of Contents
Database Security Architecture………………………………………………………………………………………………………3-4
User Account Security………………………………………………………………………………………………………………..……5-6
Database Vulnerabilities……………………………………………………………………………………………………………………5
Auditing Techniques………………………………………………………………………………………………………………………….6
Auditing Policies………………………………………………………………………………………………………………………………..7

Week 1
Database Security Architecture In the field of computer information, there is a vast amount of information that is used for operations. This information must be stored somewhere in order to be used in the future, and for programs to use
…show more content…
It is a file manager that manages data, and not a file sorter. The network infrastructure for the database server acts as the hardware and software resources of the network. They enable network connectivity and operations for managing the network. It supports the communication path and services between the user and the network. The most important thing about the database is to have it secure and safe. You want to make sure that the database is hosted on a secure network. For the best secure database, the system should remain and be installed on its own dedicated machine that is not directly connected to the network. It should not be accessible by just anyone, the super user should be the only one with access and the database should be installed behind its own firewall and perhaps a 7 layer security system. The passwords should be changed every month and include numbers and letters. There should also be no live production data because this can be copied and sent to a remote server. You can install and use host restrictions from server to server communications.

Week 2
User Account Security A database schema is built and used to group objects logically in a table and sorted into views and process procedures. A schema is somewhat of a box that contains the objects used in the database. Providing security for a database schema can be a task. To create a database schema the user will use SQL server
Open Document