BuyFindarrow_forward

Systems Analysis and Design (Shell...

11th Edition
Scott Tilley + 1 other
ISBN: 9781305494602

Solutions

Chapter
Section
BuyFindarrow_forward

Systems Analysis and Design (Shell...

11th Edition
Scott Tilley + 1 other
ISBN: 9781305494602
Textbook Problem

Many large organizations have had their database system hacked and customer data stolen. How should the security for the database be different than security for the rest of the system? Does it make a difference for web-based data designs? If so, how?

Program Plan Intro

In what ways the security for the database should be different for the rest of the system. Mention whether it makes a difference for web-based data designs, provide reason for same.

Program Explanation

Database security is equally important as it is secure physical part of system. Database control mechanism should consist of all measures to ensure that the data is correct, complete and secure. Security mechanism of database is different from security mechanism of rest of the system. For securing a database following measure can be taken:

Database should have built in security features such as subschemas, passwords, encryption, audit trials and back and recovery options.

Subschemas can be used to provide limited visibility or access to the database. Using subschema, a smaller portion of database can be made available to user.

Users can be provided with different user ID and passwords to access the relevant section of the database to avoid any kind of information leak or security breach...

Still sussing out bartleby?

Check out a sample textbook solution.

See a sample solution

The Solution to Your Study Problems

Bartleby provides explanations to thousands of textbook problems written by our experts, many with advanced degrees!

Get Started

Additional Engineering Solutions

Find more solutions based on key concepts

Show solutions add

Present Example 10.14 in Chapter 10 using the format discussed in Section 4.2. Divide the example problem into ...

Engineering Fundamentals: An Introduction to Engineering (MindTap Course List)

A micrometer uses an accurate __________ to perform measurement.

Precision Machining Technology (MindTap Course List)

What are vulnerabilities?

Management Of Information Security

A group of two or more integrated hard drives is called a(n)_____. (380) a. RAID b. SSD c. HDD d. EIDE

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)

Only one _____ exists on a network using STP.

Network+ Guide to Networks (MindTap Course List)