Q. need a response to this post.        1. Many large organizations have had their database system hacked and customer data stolen. How should the security for the database be different than security for the rest of the system? Does it make a difference for web-based data designs? If so, how? Explain your answer. Security is a universal requirement for a system. If we are building a system that would connect to the internet and be accessible to all then securing the system and its components is a major task. According to Tilley, this can be done with a combination of good design, software that can protect the system and detect intrusion, stringent rules for passwords and user identification, and vigilant users and managers (Tilley, 2019). Security for the database is a bit different than system security but it is as important as the system security. Database control must include all necessary measures to ensure that data storage is correct, complete and secure (Tilley, 2019). Either, it is a system or database, security triad of Confidentiality, Integrity and Availability remains the same only the methodology changes. System security includes access codes, data encryption, passwords, and audit trails but these security methods are implemented using additional tools and technology. Similarly, Database Management System (DBMS) implements security to data stored in the database. Tilley mentioned that a well-designed DBMS must provide built-in control and security features, including subschemas, passwords, encryption, audit trail files, and backup and recovery procedures to maintain data (Tilley, 2019). These features of the DBMS are used properly to secure the database system. For a database, a subschema can be used to provide a limited view of the database to a specific user or level of users. Different privileges can be associated with different users, so some users are limited to read-only access, while other users might be allowed to update or delete data. Encryption can be implemented on stored data to prevent unauthorized access (Tilley, 2019). In web-based data designs, a well-designed system provides security at three levels: the database, the webserver and the interconnection links that connect all the components of the system (Tilley, 2019). So, the security paradigm remains the same but with additional systems and entities to be protected across the system. Different privileges are designed by the database administrators to secure data in web-based design as data should be secure but easily accessible to authorized users (Tilley, 2019).

Fundamentals of Information Systems
8th Edition
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Ralph Stair, George Reynolds
Chapter3: Database Systems And Applications
Section: Chapter Questions
Problem 3PSE
icon
Related questions
Question

Q. need a response to this post.

 

     1. Many large organizations have had their database system hacked and customer data stolen. How should the security for the database be different than security for the rest of the system? Does it make a difference for web-based data designs? If so, how? Explain your answer.

Security is a universal requirement for a system. If we are building a system that would connect to the internet and be accessible to all then securing the system and its components is a major task. According to Tilley, this can be done with a combination of good design, software that can protect the system and detect intrusion, stringent rules for passwords and user identification, and vigilant users and managers (Tilley, 2019). Security for the database is a bit different than system security but it is as important as the system security. Database control must include all necessary measures to ensure that data storage is correct, complete and secure (Tilley, 2019). Either, it is a system or database, security triad of Confidentiality, Integrity and Availability remains the same only the methodology changes.

System security includes access codes, data encryption, passwords, and audit trails but these security methods are implemented using additional tools and technology. Similarly, Database Management System (DBMS) implements security to data stored in the database. Tilley mentioned that a well-designed DBMS must provide built-in control and security features, including subschemas, passwords, encryption, audit trail files, and backup and recovery procedures to maintain data (Tilley, 2019). These features of the DBMS are used properly to secure the database system.

For a database, a subschema can be used to provide a limited view of the database to a specific user or level of users. Different privileges can be associated with different users, so some users are limited to read-only access, while other users might be allowed to update or delete data. Encryption can be implemented on stored data to prevent unauthorized access (Tilley, 2019).

In web-based data designs, a well-designed system provides security at three levels: the database, the webserver and the interconnection links that connect all the components of the system (Tilley, 2019). So, the security paradigm remains the same but with additional systems and entities to be protected across the system. Different privileges are designed by the database administrators to secure data in web-based design as data should be secure but easily accessible to authorized users (Tilley, 2019).

References:

Tilley, S. (2019). Systems analysis and design (12th ed)., Boston, MA: Cengage Learning

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Concurrency control
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Fundamentals of Information Systems
Fundamentals of Information Systems
Computer Science
ISBN:
9781305082168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Fundamentals of Information Systems
Fundamentals of Information Systems
Computer Science
ISBN:
9781337097536
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Principles of Information Systems (MindTap Course…
Principles of Information Systems (MindTap Course…
Computer Science
ISBN:
9781285867168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Principles of Information Systems (MindTap Course…
Principles of Information Systems (MindTap Course…
Computer Science
ISBN:
9781305971776
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
MIS
MIS
Computer Science
ISBN:
9781337681919
Author:
BIDGOLI
Publisher:
Cengage