Q. need a response to this post.        1. Many large organizations have had their database system hacked and customer data stolen. How should the security for the database be different than security for the rest of the system? Does it make a difference for web-based data designs? If so, how? Explain your answer. Security is a universal requirement for a system. If we are building a system that would connect to the internet and be accessible to all then securing the system and its components is a major task. According to Tilley, this can be done with a combination of good design, software that can protect the system and detect intrusion, stringent rules for passwords and user identification, and vigilant users and managers (Tilley, 2019). Security for the database is a bit different than system security but it is as important as the system security. Database control must include all necessary measures to ensure that data storage is correct, complete and secure (Tilley, 2019). Either, it is a system or database, security triad of Confidentiality, Integrity and Availability remains the same only the methodology changes. System security includes access codes, data encryption, passwords, and audit trails but these security methods are implemented using additional tools and technology. Similarly, Database Management System (DBMS) implements security to data stored in the database. Tilley mentioned that a well-designed DBMS must provide built-in control and security features, including subschemas, passwords, encryption, audit trail files, and backup and recovery procedures to maintain data (Tilley, 2019). These features of the DBMS are used properly to secure the database system. For a database, a subschema can be used to provide a limited view of the database to a specific user or level of users. Different privileges can be associated with different users, so some users are limited to read-only access, while other users might be allowed to update or delete data. Encryption can be implemented on stored data to prevent unauthorized access (Tilley, 2019). In web-based data designs, a well-designed system provides security at three levels: the database, the webserver and the interconnection links that connect all the components of the system (Tilley, 2019). So, the security paradigm remains the same but with additional systems and entities to be protected across the system. Different privileges are designed by the database administrators to secure data in web-based design as data should be secure but easily accessible to authorized users (Tilley, 2019).

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Q. need a response to this post.

 

     1. Many large organizations have had their database system hacked and customer data stolen. How should the security for the database be different than security for the rest of the system? Does it make a difference for web-based data designs? If so, how? Explain your answer.

Security is a universal requirement for a system. If we are building a system that would connect to the internet and be accessible to all then securing the system and its components is a major task. According to Tilley, this can be done with a combination of good design, software that can protect the system and detect intrusion, stringent rules for passwords and user identification, and vigilant users and managers (Tilley, 2019). Security for the database is a bit different than system security but it is as important as the system security. Database control must include all necessary measures to ensure that data storage is correct, complete and secure (Tilley, 2019). Either, it is a system or database, security triad of Confidentiality, Integrity and Availability remains the same only the methodology changes.

System security includes access codes, data encryption, passwords, and audit trails but these security methods are implemented using additional tools and technology. Similarly, Database Management System (DBMS) implements security to data stored in the database. Tilley mentioned that a well-designed DBMS must provide built-in control and security features, including subschemas, passwords, encryption, audit trail files, and backup and recovery procedures to maintain data (Tilley, 2019). These features of the DBMS are used properly to secure the database system.

For a database, a subschema can be used to provide a limited view of the database to a specific user or level of users. Different privileges can be associated with different users, so some users are limited to read-only access, while other users might be allowed to update or delete data. Encryption can be implemented on stored data to prevent unauthorized access (Tilley, 2019).

In web-based data designs, a well-designed system provides security at three levels: the database, the webserver and the interconnection links that connect all the components of the system (Tilley, 2019). So, the security paradigm remains the same but with additional systems and entities to be protected across the system. Different privileges are designed by the database administrators to secure data in web-based design as data should be secure but easily accessible to authorized users (Tilley, 2019).

References:

Tilley, S. (2019). Systems analysis and design (12th ed)., Boston, MA: Cengage Learning

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Concurrency control
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education