Consider this hypothetical situation: You are the database administrator for an on-line student textbook rental site. You are installing a new database that will include student personal and financial information. Students will have an ID and will be able to access their accounts and place orders on-line. Create at least five rules that will verify the on-line security of your database. Include an explanation and justification for each rule.
`Hey,
Note: Brother if you have any queries related the answer please do comment. I would be very happy to resolve all your queries.
1. Have secure passwords.
The most sophisticated structures on the planet can’t shield
up-to-date an awful password. There are the typical culprits —
12345, ABCDE, whatever else on the maximum guessed password list —
but hackers have increasingly state-of-the-art updated at their
disposal that makes many different passwords increasingly
vulnerable. Now, it’s not merely making your password “password”
that up to date fear approximately. Up-To-Date be words
in-and-of-themselves. Programs exist that bet passwords that might
be words within the dictionary or typically used terms, so those
are out.
You can up-to-date make a mixture of letters, numbers, and logos updated throw off would-be hackers. You can take a look at your password here to look how long it might take hackers up-to-date wager it.
An extra thought is up-to-date set regulations that make students trade passwords on a revolving foundation. If a password isn’t modified after ninety days, the lockout that accounts pending administrator-to-dater approval up-to-date make sure that a vintage password isn’t a hacker’s manner in.
2. Encrypt your database.
Just as crucial because the passwords are the encryption of your
database. Encryption method converting your statistics up to date a
format such that, have been it up-to-date be intercepted, would
up-to-date a string of letters and numbers without a tangible
meaning. However, up to date the database software, all of it
without problems converts up to date the facts you want. However,
it ties back to updated passwords. A Yahoo! hack in 2012 exposed
extra than four hundred,000 passwords in simple textual content up
to date the net at big. This meant open to get an entry up updated
up to date emails and passwords, and the want for an entire lot of
updates who positioned their religion in Yahoo! up-to-date change
their passwords. Right here, up-to-date, you don’t need up to date
be the business enterprise at the other quit of that controversy.
make certain that your database is encrypted with the encryption
software.
3. Don’t display people the backdoor.
A simple manner up-to-date guard your database? Leave it out of
sight. This means retaining it hidden from search engine
consequences through the robots.txt file, and additionally no
longer linking updated it directly. Even as you need students
up-to-date to have up to date updated database statistics, you may
no longer need up-to-date the log-in immediately on the site. When
you have an internet database, do your self a favor and keep it on
a need-up to a date-know foundation. In any case, the first step
closer up updated hacking a database is locating it in the first
area.
4. segment your database.
An extensive open database is a substantial free vulnerability.
You’ll need updated section your records up to date make particular
that not only everybody sees the whole lot. In lots of structures,
diverse roles can be created within the database.
For example, you may need up-to-date to have updated, brilliant users, up-to-date, and up-to-date. Users can access or input primary statistics, but no longer alter statistics past what they’ve installed, whereas a superuser has pc permissions that allow more extensive up to date updated up-to-date data without being able updated exchange the entirety. An administrator-to-dater can paintings mainly of these up-to-date, changing the shape of the database or up to date more up to date data, at the same time as a super updated administrator updated can run the entire operation. For the current levels, you’ll need up to date hold the variety of human beings with the one's clearances low, such as managers or branch heads. This ensures that up-to-date a password be uncovered on the site, it’s now not devastating if it’s only someone with simple up-to-date statistics at the website online.
5. reveal updated and audit your database.
One way up-to-date save you database breaches is current hold an
eye fixed on the database itself. Monitoring up-to-date and
behaviors of the database up to date up-to-date, make sure that no
unusual behaviors are exhibited that might suggest a leak. Checking
surprising IP addresses can ensure that no person has a worker
password who shouldn’t. Consider it like when you get a name from
the bank asking you updated affirm a transaction. Your cope with is
in new york, however, your card is being used in Calgary. It’s a
red flag updated bank protection, and the same thing up-to-date be
a crimson flag up to date for your enterprise.
Similarly, frequent audits of your database assist find inactive accounts, helping remove problems that might get up with a person acquiring vintage student information. Perform periodic inspections.
Kindly revert for any queries
Thanks.
Consider this hypothetical situation: You are the database administrator for an on-line student textbook rental site....
You are employed as a database administrator by a start-up company in Menlo Park, California. The company is developing a new payments system that is attracting a lot of attention from venture capitalists. Customers will be able to process credit card transactions remotely and transmit payment information over the internet to your data center. During the latest round of negotiations for funding, one of the potential backers announced that he or she would be conducting a due diligence assessment to...
4. In Chapter 4, you saw the creation of the Tiny College database design, which reflected such business rules as "a professor may advise many students" and "a professor may chair one department." Modify the design shown in Figure 4.36 to include these business rules: . An employee could be staff, a professor, or an administrator. .A professor may also be an administrator. Staff employees have a work-level classification, such as Level I or Level II. Only professors can chair...
Overview: Database management plays an integral role in nearly every area of business. Databases house customer, accounting, and employee data, and these different data sets must all be efficiently managed in order to make the data accessible. Companies rely on database engineers to ensure that their records are accurate, updated, and tracked in real time. This course covers structured query language (SQL) and how it can be used to manage database schemas, manipulate data, and analyze data. For your final...
For milestone #1, we will start the CARIT site with three static HTML pages and a CSS file. Create a dedicated folder for this project. This folder should contain all related files in this project. The future milestones are cumulative and built directly on top of your prior work. Function/content requirements: A home page named “index.html”, which include these contents at least: Description of the center. You may reference the example sites. Latest news: use list tags; make up some...
The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...
TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...
i have the case study question with the answers but i need help to re-write the answers. please see the attached files Case Study Analysis (CSF3003) Assessment Description and Requirements CLO1: Case Study 1 Ahmad lef home to study master and PhD in Australia. He has fees for the first semester only. After he arrived to Sydney and settled down, he start looking for a part-time job to save money for the next term. Ahmad has some experience on making...
Assignment Details The Unit 6 Assignment requires you to consider how effective teams are built. Some considerations in this assignment include the traits of an effective team leader as well as the strategies one would use to recruit team members that would work effectively together. Using material from Chapter 12 of your text as well as the article in the supplemental reading (Rao, 2016), you will write an informative essay sharing best practices for effective team-building. Outcomes evaluated through this...
Please read the article and answer about questions. You and the Law Business and law are inseparable. For B-Money, the two predictably merged when he was negotiat- ing a deal for his tracks. At other times, the merger is unpredictable, like when your business faces an unexpected auto accident, product recall, or government regulation change. In either type of situation, when business owners know the law, they can better protect themselves and sometimes even avoid the problems completely. This chapter...
CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...