Question

Consider this hypothetical situation: You are the database administrator for an on-line student textbook rental site....

Consider this hypothetical situation: You are the database administrator for an on-line student textbook rental site. You are installing a new database that will include student personal and financial information. Students will have an ID and will be able to access their accounts and place orders on-line. Create at least five rules that will verify the on-line security of your database. Include an explanation and justification for each rule.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

`Hey,

Note: Brother if you have any queries related the answer please do comment. I would be very happy to resolve all your queries.

1. Have secure passwords.
The most sophisticated structures on the planet can’t shield up-to-date an awful password. There are the typical culprits — 12345, ABCDE, whatever else on the maximum guessed password list — but hackers have increasingly state-of-the-art updated at their disposal that makes many different passwords increasingly vulnerable. Now, it’s not merely making your password “password” that up to date fear approximately. Up-To-Date be words in-and-of-themselves. Programs exist that bet passwords that might be words within the dictionary or typically used terms, so those are out.

You can up-to-date make a mixture of letters, numbers, and logos updated throw off would-be hackers. You can take a look at your password here to look how long it might take hackers up-to-date wager it.

An extra thought is up-to-date set regulations that make students trade passwords on a revolving foundation. If a password isn’t modified after ninety days, the lockout that accounts pending administrator-to-dater approval up-to-date make sure that a vintage password isn’t a hacker’s manner in.

2. Encrypt your database.
Just as crucial because the passwords are the encryption of your database. Encryption method converting your statistics up to date a format such that, have been it up-to-date be intercepted, would up-to-date a string of letters and numbers without a tangible meaning. However, up to date the database software, all of it without problems converts up to date the facts you want. However, it ties back to updated passwords. A Yahoo! hack in 2012 exposed extra than four hundred,000 passwords in simple textual content up to date the net at big. This meant open to get an entry up updated up to date emails and passwords, and the want for an entire lot of updates who positioned their religion in Yahoo! up-to-date change their passwords. Right here, up-to-date, you don’t need up to date be the business enterprise at the other quit of that controversy. make certain that your database is encrypted with the encryption software.

3. Don’t display people the backdoor.
A simple manner up-to-date guard your database? Leave it out of sight. This means retaining it hidden from search engine consequences through the robots.txt file, and additionally no longer linking updated it directly. Even as you need students up-to-date to have up to date updated database statistics, you may no longer need up-to-date the log-in immediately on the site. When you have an internet database, do your self a favor and keep it on a need-up to a date-know foundation. In any case, the first step closer up updated hacking a database is locating it in the first area.

4. segment your database.
An extensive open database is a substantial free vulnerability. You’ll need updated section your records up to date make particular that not only everybody sees the whole lot. In lots of structures, diverse roles can be created within the database.

For example, you may need up-to-date to have updated, brilliant users, up-to-date, and up-to-date. Users can access or input primary statistics, but no longer alter statistics past what they’ve installed, whereas a superuser has pc permissions that allow more extensive up to date updated up-to-date data without being able updated exchange the entirety. An administrator-to-dater can paintings mainly of these up-to-date, changing the shape of the database or up to date more up to date data, at the same time as a super updated administrator updated can run the entire operation. For the current levels, you’ll need up to date hold the variety of human beings with the one's clearances low, such as managers or branch heads. This ensures that up-to-date a password be uncovered on the site, it’s now not devastating if it’s only someone with simple up-to-date statistics at the website online.

5. reveal updated and audit your database.
One way up-to-date save you database breaches is current hold an eye fixed on the database itself. Monitoring up-to-date and behaviors of the database up to date up-to-date, make sure that no unusual behaviors are exhibited that might suggest a leak. Checking surprising IP addresses can ensure that no person has a worker password who shouldn’t. Consider it like when you get a name from the bank asking you updated affirm a transaction. Your cope with is in new york, however, your card is being used in Calgary. It’s a red flag updated bank protection, and the same thing up-to-date be a crimson flag up to date for your enterprise.

Similarly, frequent audits of your database assist find inactive accounts, helping remove problems that might get up with a person acquiring vintage student information. Perform periodic inspections.

Kindly revert for any queries

Thanks.

Add a comment
Know the answer?
Add Answer to:
Consider this hypothetical situation: You are the database administrator for an on-line student textbook rental site....
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • You are employed as a database administrator by a start-up company in Menlo Park, California. The...

    You are employed as a database administrator by a start-up company in Menlo Park, California. The company is developing a new payments system that is attracting a lot of attention from venture capitalists. Customers will be able to process credit card transactions remotely and transmit payment information over the internet to your data center. During the latest round of negotiations for funding, one of the potential backers announced that he or she would be conducting a due diligence assessment to...

  • 4. In Chapter 4, you saw the creation of the Tiny College database design, which reflected...

    4. In Chapter 4, you saw the creation of the Tiny College database design, which reflected such business rules as "a professor may advise many students" and "a professor may chair one department." Modify the design shown in Figure 4.36 to include these business rules: . An employee could be staff, a professor, or an administrator. .A professor may also be an administrator. Staff employees have a work-level classification, such as Level I or Level II. Only professors can chair...

  • Overview: Database management plays an integral role in nearly every area of business. Databases house customer, accoun...

    Overview: Database management plays an integral role in nearly every area of business. Databases house customer, accounting, and employee data, and these different data sets must all be efficiently managed in order to make the data accessible. Companies rely on database engineers to ensure that their records are accurate, updated, and tracked in real time. This course covers structured query language (SQL) and how it can be used to manage database schemas, manipulate data, and analyze data. For your final...

  • For milestone #1, we will start the CARIT site with three static HTML pages and a...

    For milestone #1, we will start the CARIT site with three static HTML pages and a CSS file. Create a dedicated folder for this project. This folder should contain all related files in this project. The future milestones are cumulative and built directly on top of your prior work. Function/content requirements: A home page named “index.html”, which include these contents at least: Description of the center. You may reference the example sites. Latest news: use list tags; make up some...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • i have the case study question with the answers but i need help to re-write the...

    i have the case study question with the answers but i need help to re-write the answers. please see the attached files Case Study Analysis (CSF3003) Assessment Description and Requirements CLO1: Case Study 1 Ahmad lef home to study master and PhD in Australia. He has fees for the first semester only. After he arrived to Sydney and settled down, he start looking for a part-time job to save money for the next term. Ahmad has some experience on making...

  • Assignment Details The Unit 6 Assignment requires you to consider how effective teams are built. Some...

    Assignment Details The Unit 6 Assignment requires you to consider how effective teams are built. Some considerations in this assignment include the traits of an effective team leader as well as the strategies one would use to recruit team members that would work effectively together. Using material from Chapter 12 of your text as well as the article in the supplemental reading (Rao, 2016), you will write an informative essay sharing best practices for effective team-building. Outcomes evaluated through this...

  • Please read the article and answer about questions. You and the Law Business and law are...

    Please read the article and answer about questions. You and the Law Business and law are inseparable. For B-Money, the two predictably merged when he was negotiat- ing a deal for his tracks. At other times, the merger is unpredictable, like when your business faces an unexpected auto accident, product recall, or government regulation change. In either type of situation, when business owners know the law, they can better protect themselves and sometimes even avoid the problems completely. This chapter...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT