This website uses cookies to ensure you have the best experience. Learn more

Database Security Essay

1827 words - 8 pages

CSS330-1502A-01
Database Security
Individual Project Key Assignment
Chris Pangburn
27 April, 2015

Table of Contents
Week 1: Database Security Architecture 4
Differentiate between a Database Management System and a database 4
Network Infrastructure for the best security posture 4
Additional Security mechanisms to protect the Database Server 6
Week 2: User Account Security 7
Creating Schemas 7
Creating Users, Creating Roles, Assigning Privileges based on Access Control Lists 7
Creating Views 10
Week 3: Database Vulnerabilities 11
Description of tools used to perform scans 11
Scan Information 11
False Positive Information 12
Discuss SQL injection attack 12
...view middle of the document...

Each database will be managed by the overall DMS but has no relation to the other databases being managed.
Network Infrastructure for the best security posture
To create the most secure infrastructure for a DMS server you need to first begin with the facility that will be housing your network. The server room should be located inside a building with a secure door that only authorized personnel can gain access through. The server room should have separate environmental controls from the rest of the facility and backup power from commercial power should be available to the server racks. Backup power does not mean you need your own generator but at minimum a Universal Power Supply that can sustain power to the server long enough for an auto generated clean shutdown of the system should a commercial power outage occur.
The point of presence where your company network meets the commercial Internet Service Provider hardware that connects your network to the internet should also be in a secure protected room that only authorized individuals may enter. At this location some type of network device will exist usually a router, then a firewall, which will segregate traffic keeping the outside world away from your internal company network.
The firewall will protect your network using access control lists and can be connected to multiple subnets of your overall corporate network. The DMZ is where you would have your web servers that the public can access, but the SQL server should be kept on a separate subnet that is connected to the firewall but also separated from the internal public network where employees access resources. Even though all of these servers are on separated subnets, they could still be kept in the same rack space and attached to the same network switch that is using VLANs to separate the traffic.

Additional Security mechanisms to protect the Database Server
Additional security mechanisms do not always need to be a hardware device like a proxy server or a software program such as malware protection. The network should utilize some type of scanning tool which checks for operating system and DMS open vulnerabilities that can be mitigated. Employing hardening checklists such as Secure Technical Implementation Guides produced by the Defense Information Systems Agency will provide recommended secure settings that may be implemented on the operating system and application software. Anti-Virus software would need to be installed on all servers in the corporate network including the SQL server. For a Microsoft Active Directory network a Windows Server Update Service server should be in place that can be configured to deploy security patches and service pack updates to all windows operating systems and applications on the network.

Week 2: User Account Security
Creating Schemas

Creating Users, Creating Roles, Assigning Privileges based on Access Control Lists

References for SQL code: (Kriegel, 2011), (Wilton, 2005)
Creating...

Other Papers Like Database Security

Cloud Database Essay

2610 words - 11 pages specialize company. Hence, cost saving on maintenance, equipment, manpower and electricity are solved. In this report, we will be discussing on the concept of cloud database, its advantages and disadvantages and security challenges that companies may face when using this new technology. In addition, looking into areas of different approaches from cloud providers who adapt cloud database and how to counter the security weakness. 2. Cloud Database

Biometrics Essay

1931 words - 8 pages following categories. 1. Confidential 2. Secret 3. Non-secret 4. Public Confidential pages over the network provide full security. No way to tamper data in the page by third party. In this case biometrics are more useful and no way to disturb the page contents. First of all store all data about biometrics in database after that tally with this data. If tally satisfies with backend then provide access to the user. Collecting

Database 1

535 words - 3 pages ) Data Consistency c) Data Sharing d)Data security Disadvantages:- a) Cost of hardware and software b) Cost of data sharing c) Database Failures d) Complexity 3. Identify some informal queries and update operations that you would expect to apply to the database shown in Figure 1.2.? Ans: The database has shown the student information for smith and brown. It also represents the course details. Then it shows the intake of

Visual Basic Database Tutorials

708 words - 3 pages objects. This might seem trivial but in the long run will save you development time down the road. * Access SQL Microsoft Access allows you to create, retrieve, and manipulate data using the SQL language. This tutorial explains all the main ways you will want to use this SQL language within your Visual Basic application or other programs. * Access Security Microsoft Access is a great database application that is easy to interface into

Securing Sql Server

1297 words - 6 pages should occur. These steps will help a system recover quickly with virtually no loss of data. Best practices for Securing SQL server Some of the best practices in securing a SQL server are to set security parameters. Some of these include the creation of a data base and changes to that data base. Any new database created must be requested using a data base request form that has the proper documentation including an application of who the

Data Sysytems

2851 words - 12 pages these are customized according to the needs of the end users. A cycle of coding, testing and debugging continues until the database is ready for delivery. Security is also addressed at this time, physical and password security a determination of access rights and audit trails are developed. Data encryption and firewall are built. An implementation plan or written schedule is important to take steps to ensure deployment and transition is

Requirements Report Yr 12 Ipt

664 words - 3 pages administrators for the system which will allow us direct access. Our access may be required to repair any faults in maintaining a progressive database system. The database will also help us to keep track of the correct funds being collected for us carrying out the necessary tasks. SECURITY MEASURES: Each PC will be installed with a 12 Month protection of Norton Security Software to prevent any risk or access of computer viruses or threats to the

Computer Science

684 words - 3 pages the previous lecture) same way when data at the conceptual level is correlated with the same data at the internal level, this is called the conceptual/Internal mapping. When you connect to SQL Server or SQL Azure, you need to specify a target database for migration. If you have multiple Access databases you can map them to multiple SQL Server databases (or schemas) or to multiple schemas under the

Statement of Work

552 words - 3 pages allotted: 5 days * Deliverable: The Schema of the database for review * Testing and Security: Sample data will be added in order to test the databases ability to track business processes. * Time allotted: 3 weeks * Deliverable: Documented test results * Database Completion and Installation: Final changes and corrections are made. Sample data will be removed and the database installed on a server. Final testing for server access and connections. * Time allotted: 3 weeks * Deliverable: The working database * Total time between beginning and end of project: 14 weeks, 5 days

Mis Tutorial Answer Sheet

1013 words - 5 pages are impossible to generate; a new report could require several weeks of work by more than one programmer and the creation of intermediate files to combine data from disparate files. Poor security results from the lack of control over the data because the data are so widespread. Data sharing is virtually impossible because it is distributed in so many different files around the organization. Define a database and a database management system

Chapter 1 Essay

852 words - 4 pages and presentation, security management, multiuser access control, backup and recovery management, data integrity management, database access languages and application programming interfaces, database communication interfaces. 5. What is structural independence, and why is it important? a. The possibility to make changes in the file structure without affecting the application program's ability to access the data, it is important so that changes

Related Essays

Computer Essay

390 words - 2 pages and security. Most databases store valuable information that must be protected against deliberate trespass and destruction. The database must also be monitored to ensure quality data. As some of the data may be entered into to the database remotely, there may be issues with the quality of input. Many databases will contain a vast amount of information which is usually extremely important to a business. This can cause a certain amount of

Management Paper

1176 words - 5 pages Prepare a 1000+ word-paper on database management. Begin by detailing the functions of database management. Then, discuss security, concurrency, and control, as well as the role of a database administrator in database management. Functions of Database Management Database management systems have evolved fairly slowly over the last 30 years. The first commercial programming languages had file handling systems that took the responsibility

Database Encryptin Solution Essay

1274 words - 6 pages be protected both when at rest and during movement between applications and the database. 2. 1. Database-Layer Encryption In this case, an enterprise is able to protect data as it is being written and read from a database. Database layer encryption is done at the column level within a database table. It can be coupled with access controls and database security so as to prevent theft of critical data. This level of encryption protects data

Database Essay

959 words - 4 pages implements the files needed for a specific software application as part of programming the application. In database approach a single repository of data is maintained that is defined once and then is accessed by various users. What are the responsibilities of the DBA and the database designers? DBA - Authorizing access, security, acquiring software and hardware resources as needed. Managing staff of designers and others. DB Designers