Nt1330 Chapter 9

Improved Essays
Submit the questions as a Word document attachment.
Chapter 9 Project Questions: 56, 59, & 60. Ensure you include a link to the websites and APA information.
Chapter 9 Review Questions: 1, 2, 4, 7 - 9, 11 - 19, 30, 31, 36, 38 - 45, 51, & 54.
Chapter 10B Review Questions: 8 - 11.
***Please note that your Final Project is due at the end of next week, Week 7.***

Chapter 9 Project Questions
56. I found an article detailing Oracle Solaris 11 and it’s security implementations. The basics of the article was it is designed to ensure different layers of security, including user access, system privileges and security resources.
It explains how the basics of Oracle security is outlined which is parallel to DBMS security that includes the user, the
…show more content…
The DBA’s responsibilities include physical design, installs, security, backups, and requirements of the database.
7. The trade-offs for concurrency controls are: a. If it’s too strict it can lead to locking the entire database. b. Other measures have low level of concurrency control.
8. Atomic transaction ensures that all the actions on the database are done or none of them are done at all. If none of them are done then the database remains unchanged. It’s important because if ensures that important actions are taken that would otherwise undermine a specific action. For example, overcharging a customer, when they deleted their purchase.
9. A concurrent transaction is when two transactions are being processed against a database at the same time. A simultaneous transaction seems like it is happening at once, but in reality the different transaction is performed on a different line item, and then immediately switched back to the first request. Only one CPU is required for a simultaneous transaction.
11.
12. Lock granularity is the size of the lock.
13. An exclusive lock, locks the item from any other access. No other transaction can read or change the data. A shared lock locks the item from change but not from
…show more content…
Access control lists, and permissions should be implied on a DBMS system to ensure the integrity of it.
42. User accounts and passwords should be protected. Permissions should be set where the lowest level of access is maintained. Ensure the use of groups is accurate.
43. Two elements of a database security plan are: procedures in the event of a security risk, and the design of the security plan.
44. The advantages of a DBMS security plan is it is dependent and designed around the DBMS system itself. The disadvantage of DBMS security plans is software updates may lag behind other notable security updates.
45. An SQL injection attack is when a user modifies an SQL statement by injecting their own code into a statement. This can be prevented by locking special characters in a text box, and not showing the error page to a user.
51. Having frequent checkpoints of a database allows quick restoration of a database, as long as they are done repeatedly in a limited time frame.
54. Data repository is important due to giving important information about the database, including permissions, user data, and a general bird-eyes view of what state the database is in. Without one large organizations have trouble making decisions on their overall

Related Documents

  • Decent Essays

    To avoid this DBA can use policy based management which can do the regular checks and make sure that database server are properly configured as we want them to be. 4. Policy based management offers another ability to DBA that it enforces the best practice standards against the databases. Apart from able to create a custom policies we can also use the SQL Server best practice policies which will come default when…

    • 391 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    1. Policies: Policies like Acceptable Use, Internet Access, and Email and Communications Policies can take the risk out of the user’s hands of doing what is right. Sites that could hold malicious codes and viruses can simply be blocked from access so that it isn’t even in their “hands” to make the decision. 2. Provision Servers: Using software like IPAM, making sure that your servers all have static addresses assigned to them.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Task 2 (P2) Describe the following physical security measures and explain how they may be used to help keep systems secure. • Locks Locks are physical security measure that can be used in different aspect within the company. The locks can be put on the door to avoid people who not supposed be in the building or employees who not supposed be on that room. There are different types of locks that can be used within the company such as Password locks that be put on the doors, this will avoid anyone coming to room without password identification to enter the room. Also the company can use ID IDENIFACTION on the door so any employees comes have to use their ID in order to enter the building, this will…

    • 806 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    1.02.01 Warning Banner

    • 567 Words
    • 3 Pages

    Sub section 9.1.02.01 – Warning Banners Current Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers,desktops, VPN connections, network devices). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government regulations and UnitedHealth Group directives. Modify Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers, desktops, VPN connections, network devices, application elevations). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    Data Confidentiality: When you keep important data it is important that the data doesn’t go out to the wrong hands. So if a business data is suddenly leaked online or maybe stolen, then this can result in a huge loss for the business and this can potentially put the business out of business. To overcome this problem, then you would need a good security program which can safeguard against any breach in confidentiality. Data Integrity: This is used to ensure that the most important data is secure and also makes sure that the data isn’t messed around with. If any of the data has been messed around with then this can result in major problems.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Project Part 1 Task 1: Outline Security Policy First World Bank Savings and Loan; a financial institution that offers banking services (loans and deposits). The bank would like to provide online banking services to the customers, which includes online credit card use for loan applications. Recommendations are based on such factors as: ownership total cost, scalability, and reliability. Decisions and recommendations made need to be appropriate from the CIA triad perspective.…

    • 1249 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    The security systems will be focused on management security, operational security and technical security controls. Management Security: These are management controls that will focus on the management of the IT security system and the management of risk for interconnected systems in HBWC environment, and includes techniques and concerns usually addressed by IT management. Operational Security: The operational controls address security methods focusing on mechanisms primarily implemented and executed by people (as opposed to systems). These controls are put in place to improve the security of a particular system (or group of systems). Often, they require technical or specialized expertise and rely upon management activities as well as technical controls.…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    For this week 's assignment you will answer some short essay questions where you should refer back to the textbook to answer the questions in complete sentences. Each question should be answered in 3-5 sentences. 1. Describe and analyze age appropriate classroom design for kindergartners ' physical, cognitive and socio-emotional characteristics of development. Give examples to support your analysis.…

    • 778 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Zillow Case Study Essay

    • 1460 Words
    • 6 Pages

    Introduction In this case study, the business of Zillow.com in providing real estate information to all users to its website is explored, and the use of business intelligence by Zillow.com in its offering to customer, and the way it uses a data mart to market its new product, are discussed. In addition, this case study includes a discussion of various characteristics of information quality as seen from Zillow’s perspective, and how Zillow is using a data-driven website. Analysis Background of Zillow.com Zillow.com is an online web-based real estate site helping homeonwers, buyers to find and share information about real estate and mortgages. It allows users to access information anonoyoumously and free of charge, using the kinds of tools…

    • 1460 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    In a complex environment, the management of user access to databases and other network resources can become a daunting task. Users are dynamic, with changing privileges, and role based access controls (RBAC) are a powerful way to both organize permissions into groups, and therefore ease user administration. Importantly, technical employees such as database administrators, are then able to dedicate more time to troubleshooting security issues and organizing the system than to micromanaging the access privileges of many individual users What is Role Based Access Controls? Role-based access control (RBAC) is an approach to managing entitlements, intended to reduce the cost of security administration, ensure that users have only appropriate entitlements…

    • 786 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    External building security Name Course Institution Tutor Date Introduction External security is considered to be very critical in designing a house. It helps in the creation of a conducive environment for the operation of activities without any fear of burglary. Building a house takes more than just installation of security internally or externally. There exist some basic principles which prevent the house from all aspects of attack while protecting the owner of the house.…

    • 1415 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Curtin University is an educational provider, which has attracted students from around the world to come to Australia and study at Curtin University, implementing the right security procedure is a key aspect for Curtin University to encourage students to choose Curtin University and the deployment of the right procedures will help Curtin achieve it’s financial objectives “an effective security strategy helps to ensure good security management throughout the organisation and indeed is an important part of its corporate governance. A security strategy that is directly related to the wider organisational strategy is necessary in order to give a sense of direction to the security functions (including, for example, physical and personnel security),…

    • 1476 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Now, that I have provided you with pertinent information concerning all four phases, you can now judge for yourselves that BPM is the very likely key to success for any business, which is all because of the fact that BPM is composed of a system method of procedures to really operate an organization or business. Business Process Management (BPM) has the tendency to lessen the peril of unsuccessful procedures within a company, simply, because it is made up of all the processes and regular functions associated with the business and/or organization. Each person primary act of duty in the business is to fully understand what is actually expected of them and how they plan to do work in a methodical effort. My Overview: From points of views…

    • 1617 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    In order to have a good relational database and to avoid unnecessary data in your database systems you are required to perform normalisation. According to Rob et al. , (2008) Normalization is a process for evaluating and correcting table structures to minimize data redundancies, thereby reducing the likelihood of data anomalies. √ Normalisation helps us to structure our database tables effectively in order to improve the performance of the database systems.…

    • 1521 Words
    • 6 Pages
    Improved Essays