Many large organizations have had their database system hacked and customer data stolen. How should the security for the database be different than security for the rest of the system? Does it make a difference for web-based data designs? If so, how?

What will be an ideal response?


Database security should be part of overall system security. But there are specific actions a DBA can take to further secure the database. For example, the DBA can define authorization procedures to ensure that only legitimate users can access the database and can allow different users to have different levels of access. Most DBMSs provide sophisticated security support.
Encrypting sensitive data in the DBMS provides additional protection. For example, Personally identifiable information (PII), data that could potentially identify a specific individual, should be encrypted.
Web-based data designs require end-to-end encryption of network traffic, secure connections with proper security certificates, and mechanisms in place to safeguard customer data stored on the server or in the cloud.

Computer Science & Information Technology

You might also like to view...

Streams are easy to parallelize, enabling programs to benefit from enhanced performance on ________ systems.

a. uni-core b. serial c. multi-core d. sequential

Computer Science & Information Technology

Access automatically constructs an equivalent SQL statement for queries when the query is created.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ________ function identifies the highest value in a database column that matches specified conditions in a criteria range.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Julianne is planting a ground cover in one area of her yard. The area she wants to cover is rectangular shaped and measures 9 ft by 3.75 ft. The manager of the garden shop tells her that she will need to purchase four plants for every square foot of area she wishes to cover. How many plants will she need to buy to complete this project?__________ plants

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology