Database Security Plan Essay

8572 Words35 Pages
CSS330-1404B-01: Database Security
Phase 5 IP: Auditing Policies
Database Security Project Plan
Reginald “Reggie” Lee
Colorado Technical University Online
Professor Anita Arceneaux
December 22, 2014

Figure 1: (, 2014)

Table of Contents
Database Security Architecture 3 Differences between a database and a DBMS 3 Types of database designs 4 Network Infrastructure for Database Security 5 Common Security Threats for Database Servers: 6 Additional Security Mechanisms for Protecting Database Server 9
User Account Security 11 1. New Schema for HR Database 11 2. Corporate Directory & Manager Information Views: 12 3. Created Users: 14 4. Created Roles: 15 5. Implemented the Following Access
…show more content…
A DBMS is a software program that is intended to manage and query multiple databases. A single database is comprised of tables of relational data, whereas a DBMS can manage relational data that crosses more than one database, and it serves as a manager of the interfaces between the numerous databases, allowing relationships to between databases to be formed. Database managers enhance the classic search feature in most systems to be that much more powerful and vigorous (Onh, 2009).
The DBMS ensures that the databases and data stored within it maintains its integrity or in other words, it makes certain the data remains accessible and is reliably structured as anticipated and only those with the appropriate access privileges are allowed to access the data. Some examples of classic DBMSs are relational database management system (RDBMS), the Structured Query Language (SQL) and newer kind of DBMS is the object-oriented database management system (ODBMS) (Rouse, 2014).
A database management system is normally an integral part of a database system. Microsoft Access is an example of a popular DMBS designed with the small business user in mind. Microsoft's SQL Server on the other hand is an example of a DBMS that has the ability to serve database requests from multiple clients or users. One of the first DBMSs was IBM's Information Management System (IMS). As IBM proved, a DBMS might be utilized by or collectively
Get Access