Verified Document

DBMS Database Management Systems Since Term Paper

Data Security Policy

There are instances when not all information in a database is open for access to a user. Hence, there is the data security policy that controls the level of access a user has. According to Oracle Corporation Online,

Data security includes the mechanisms that control the access and use of the database at the object level. Your data security policy determines which users have access to a specific schema object, and the specific types of actions allowed for each user on the object.

Generally data security is based on how sensitive information is (Oracle Corp.). Important and confidential information is always necessary to be accessible only to a limited number of users.

User Security Policy

This policy defines how users will be allowed to access a database. The most common user security elements are password security and access privileges of users. To maintain a secured access to database and to lessen illegal database access, the database must feature periodical change of passwords. For instance, users will be asked by the system to change their password every quarter of a year. Encryption of password is another useful user security policy. In cases when there is an unauthorized access to user account information, password data is still secured because what is stored in the database is not the real password but its encoded form.

User security may also involve the definition of specific areas in a database where a user is allowed to access. This privilege management policy is important especially if a database services many users. Database roles can be created to implement this policy.

Auditing Policy

It is common that databases are audited to check the reliability of information it contains. However, there are also activities in a database that must be restricted to auditors. A database administrator must properly set database auditing procedures...

Parts of this document are hidden

View Full Document
svg-one

Otherwise, the problem of information misuse will never be solved.
In many business sectors, along with the obligation of maintaining database security policy is the implementation of different hardware and software that can protect databases from unauthorized access. Several of these are the following.

Antivirus Software

Antivirus softwares are typically installed in the computer system and should always be enabled to allow constant protection from viruses. The software and hardware requirements depend on the antivirus product being used.

Network Firewall

Products of this type protect a network from unauthorized database access and any information within the network.

Above all the database security policies and software and hardware protections, the most important procedure to prevent data loss should the database security fails is the process of maintaining a periodic backup of the database. With a backup, it can be said that a database is secured whether in times of database security problems or in times when the database is secured.

Bibliography

Jucan, George. Database Security: Beyond the Password.

Retrieved on June 06, 2005, from Oracle Technology Network. http://www.oracle.com/technology/pub/articles/jucan_security.html

Establishing Security Policies.

Retrieved on June 05, 2005, from Oracle Corporation Online. http://www-rohan.sdsu.edu/doc/oracle/server803/A54641_01/ch19.htm

Sources used in this document:
Bibliography

Jucan, George. Database Security: Beyond the Password.

Retrieved on June 06, 2005, from Oracle Technology Network. http://www.oracle.com/technology/pub/articles/jucan_security.html

Establishing Security Policies.

Retrieved on June 05, 2005, from Oracle Corporation Online. http://www-rohan.sdsu.edu/doc/oracle/server803/A54641_01/ch19.htm
Cite this Document:
Copy Bibliography Citation

Related Documents

Technology in Film Fred Ott Was the
Words: 1898 Length: 6 Document Type: Essay

Technology in Film Fred Ott was the very first movie star that every existed. His brief starring role in the five-second film that showed him sneezing started the use of technology to make films. Since then, technology both in and out of film has changed immeasurably and what technology is used and is said about technology in these same films has evolved quite a lot and the statements sometimes made are

Technology Proposal Social Networking and
Words: 1070 Length: 4 Document Type: Term Paper

Creating an effective library social networking platform needs to start with a view of how to create a content management system (CMS) first (Dickson, Holley, 2010). The CMS serves as the system of record of all catalog and collection items, providing valuable statistics on how each book, content and collection item is being used (Shapira, Zabar, 2011). This is extremely valuable information for each department in the library to

Technology for Students With Disabilities
Words: 3214 Length: 11 Document Type: Research Paper

These benefits arise because of implementing both assistive technologies and Information Communication technology (ICT). The implementation of technology in classrooms usually has benefits to both the disabled students as well as the teachers (Kirk, Gallagher, Coleman, & Anastasiow, 2012, p.240). The general benefits of use of assistive technologies and ICT in teaching students with learning disabilities include greater learner autonomy and unlocking hidden potential with those with communication difficulties.

Technology in the Workplace the
Words: 2715 Length: 9 Document Type: Research Paper

Instead, organizations must strike a balance between the autonomy and independence offered by technology in the workplace and the need for employees to have some level of formal and informal commitment to the organization as a whole. Just as seemingly counterproductive activities such as doodling, daydreaming, or, in the information age, surfing the internet, can actually contribute to efficiency by offering employees productive mental stimulation, so too can the

Technology in the Classroom in Today's Society,
Words: 3260 Length: 10 Document Type: Research Paper

Technology in the Classroom In today's society, technology has become an accepted medium for communication. From email correspondence that has taken the place of mail, to texting instead of talking, advances in technology have become integrated into our daily lives. However, the line should be drawn when it comes to technology impeding academics and being incorporated into the classroom. Although many support the notion of technology in the class, others see

Technology Acceptance Model Tam and Information Systems Success...
Words: 4229 Length: 15 Document Type: Literature Review

Technology Acceptance Model Using Technology Acceptance Model (TAM) to Assess User Intentions and Satisfaction on Software as a Service (SaaS): The Value of SaaS Software as a Service (SaaS) was researched by Benlian and Hess (2011) in an effort to determine its value to companies. Among the arguments was that SaaS is already declining in popularity even though it is very new. The majority of the arguments that lean in that direction have

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now