Phase 5 IP: Auditing Policies
Database Security Project Plan
Reginald “Reggie” Lee
Colorado Technical University Online
Professor Anita Arceneaux
December 22, 2014
Figure 1: (Microsoft.com, 2014)
Table of Contents
Database Security Architecture 3 Differences between a database and a DBMS 3 Types of database designs 4 Network Infrastructure for Database Security 5 Common Security Threats for Database Servers: 6 Additional Security Mechanisms for Protecting Database Server 9
User Account Security 11 1. New Schema for HR Database 11 2. Corporate Directory & Manager Information Views: 12 3. Created Users: 14 4. Created Roles: 15 5. Implemented the Following Access …show more content…
A database is a organized group of data that is easily navigated. The retrieval of data is simplified when accessing a database. Databases tend to be structured in a specified manner to allow data to be sorted and queried with ease (Onh, 2009).
The hierarchical model of information gathering and storing arranges data into the form of a data-tree, much like a parent child structure. In a typical database of employee data, the parent information may be the employee name, as the child data may be the phone number, salary, or social security number of the employee's. Similarly, the employee name may be in a child association to his/her manager (Onh, 2009).
Types of database designs Databases can be developed as hierarchical, network, relational, or object-oriented in their design: * The hierarchical design of information gathering and storing arranges data into an information tree, in a parent child configuration. In an employee database, the parent data could be the employee’s name, whereas the child data could be the phone number, salary, or social security number of the employee. Similarly, the employee’s name of might be in a child relationship to his or her manager (Onh, 2009). * The network design is related, but cross parenting is allowable, and causes the tree to take on a lattice arrangement. In the employee database example, two employees might share an office phone. The network model allows the phone number to be in a child relationship with