preview

Assignment 1: Database Analysis

Decent Essays

The database for the company merger, can be one of the most vulnerable systems in an organization due to their complexity and the amount of sensitive data it contains. The purpose of having a database security plan, is to protect critical information from exposure to both internal and external threats to the system. This could be malicious or unintentional, but both can do the same amount of harm to the database. To begin creation of a database security plan, you first need to know what are the potential threats to the database, how to protect against or mitigate them, and what other options exist for hosting a secure database environment.
Some of the Potential threats to the organization and its databases are unwanted changes to the database …show more content…

The first area to control is user authorization, this refers to granting rights or privileges to an end user or a group of users to legitimately access the database and its objects (data). When a user tries to log into the database, SQL tells the system who is trying to access the system and authenticates them if they have proper access. Each object in the database also has its own security class and rules associated with them. This helps individual sets of data remain hidden from certain users regardless of their access to the server and database. User account passwords should be stored in an encrypted format that can be located in the server, database, or an external network …show more content…

The access controls based on rights or privileges granted, allows users the ability to read, write, modify, and execute objects in the database. Access to the database, also allows for the use of SQL utilities such as: backups and security logs that should be available to select users. Database privileges should only be given to uses whose jobs require the access. If this is only a temporary access grant, it should be logged and revoked after the task is complete. All of these access controls can be controlled through SQL discretionary access control (DAC). This supports GRANT and REVOKE commands to give or remove privileges from end users. Mandatory access control (MAC) is a more advanced hierarchical access control mostly used by government agencies as well as financial institutes and is an add-on not included in the standard versions of SQL Server. The database also can restrict users by its views. Database views are customized per user. They can hide the more complex side of the database giving less technical users a simple interface for running queries, while also restricting users from accessing specific tables and columns that have sensitive information such as credit card and social security

Get Access