Topic 5 DQ 1

docx

School

Maryville University *

*We aren’t endorsed by this school

Course

615

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

2

Uploaded by mserenity23

Report
The article "Security in the Database Design Process" underscores the critical importance of prioritizing security in tandem with performance during the database design process (DB…, 2019). In the contemporary data-driven landscape, cybercriminals have transitioned from engaging in mere exploitative activities for amusement to orchestrating sophisticated attacks for financial gains, with organizations facing substantial financial repercussions for data breaches. The article cites the average cost of a data breach in 2018 as $3.86 million, compelling every database developer to prioritize security to avert such financial liabilities. The identified security issues encompass data, systems, and users, urging designers to consider potential scenarios where information might be compromised. To fortify databases against potential vulnerabilities, the article recommends adopting the CIA Triad Concept, emphasizing the need for a balanced approach between confidentiality, integrity, and availability (DB…, 2019). Practical steps to ensure database security are elucidated, including physically securing servers, implementing proper firewalls, keeping systems updated, and incorporating identity and access management principles. Change management and database auditing are also advocated as essential measures for monitoring and addressing security breaches promptly (Pool et al., 2024). In the healthcare sector, where patient confidentiality and data integrity are paramount, the integration of these secure concepts aligns seamlessly with the stringent requirements of clinical data security. The article's emphasis on encryption, access controls, and monitoring aligns with healthcare regulations, ensuring that sensitive patient information remains confidential, unaltered, and accessible only to authorized personnel (DB…, 2019). The recommendation to use change management and regular auditing aligns well with healthcare's dynamic environment, where continuous monitoring and adaptation are necessary to safeguard against evolving cyber threats. Overall, the article provides
comprehensive insights into the multifaceted aspects of secure database design and its relevance in contemporary data protection efforts. DB Designer. (2019). Prioritizing Database Security in the Design Process. DB Designer . https://www.dbdesigner.net/prioritizing-database-security-in-the-design-process/ Pool, J., Akhlaghpour, S., Fatehi, F., & Burton-Jones, A. (2024). A systematic analysis of failures in protecting personal health data: a scoping review.  International Journal of Information Management 74 , 102719.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help