Running head: DATA BASE SECURITY 1
DATA BASE SECURITY 5
Data is essential for any organization where the statistics and facts are collected during a specific business’s activities and operations. They are primarily used to measure the company’s activities or outside the firm where even recording is done. Data is said to have several benefits. It allows the firm to make informed decisions by providing data in a much easier way that an individual of interest can interpret. In general, data is just raw facts and statistics (Peter Aiken, 2013).
What are the strategic and technical security measures for good database security?
Database security is defined as the range of different tools, measures, and controls that are designed or made in a way that that will be able to preserve and establish the availability, integrity, and confidentiality that it has. It helps guide the data against compromising the data systems, leading to reputation damages, financial losses, brand erosion, and even a low level of consumers’ confidence in a particular product or service being offered. In an organization, one can employ automated access management where one uses access management software. One can also include the strong password criteria, which have been encrypted, thus managing the number of individuals accessing it. Also, one can employ the account locking technique after the successful failure of logging attempts by an individual in a firm website, where one can hire the deactivation of the accounts when there are off periods after work (Park, 2007).
Another strategy that can be used to secure if the data systems are having regular updating of the operating systems that one uses ad the patches. This one helps protect one’s database system from the most recent vulnerabilities discovered on cybercrime. one is advised to ensure that he/the database security systems provided by the database are enabled not unless there be a specific reason for it being disenabled. More so, auditing and the continuous monitoring of the database activity includes keeping track of the attempted logos and the logins to a database a day operating systems. One can also employ the alerting techniques that help notify against any potential dangerous malicious activity that probably has been identified. It noted that effective monitoring should give one way when an account has a compromised login, in case of database attack or even when there is a suspicious activity carried out to any of the data as systems. Also, in the sharing of accounts, alerts should give authority to a particular individual having access to the data systems
Another strategy that ac e sued in securing that database system is encrypting the data and the backups. In most organizations, it’s said that it’s very okay to encrypt data that has been stored in the database systems. One should ensure that the data has been backed on frequently and sill ensures that the backups have been encrypted and still stored differently as they have been decrypted. It’s noted that through the regular backing up of the database systems, it minimizes the chance that might be there that can lead o database hacking. Another strategy is by having a standard test of one’s database security systems, such as the infrastructure on the database system, where one should put it under an actual attack so that one can check on it. It also helps determine the vulnerabilities of data hacking, where they help one find any vulnerabilities and develop a mechanism for dealing with them. Ensuring that the database security test is done is of high quality, the third-party white hat hackers and the specialized services (Park, 2007).
The last strategy that one can employ is web applications, together with the database firewalls. It noted that the firewalls deny any access that may lead to data traffic by default. The firewalls also help in shielding the outbound connections not unless there arises an emergency need. During the protection of the various data database systems, one is highly advocated to have usage of the web applications firewall (Silva, 2019).
Be sure to discuss at least one security model to develop databases for organizational security properly.
A security model is considered a set of procedures used in evaluating and authenticating these policies to map the intellectual’s objectives of a specific approach to a data system through explicit data techniques and structures that are important in the policies of security. An excellent example of such a model is the state machine model found on a finite state machine. They’re noted to be used in complex systems having the recognizers, the acceptors, transaction functions, and the state variables. It generally defines a small number of states’ characteristic behavior, actions that have a probability of happening, and the transaction between them. The model diagram finite machine is as shown below,
Another model is the noninterference model, which was noted to be designed to ensure that other subjects and the objects of various levels don’t interfere with the issues and the things of other groups. The models are not to have usage of the inputs and the outputs of sensitivities that are high or at low data categories. It noted that in the model, a particular data attempt is very independent, and that data in it cannot look at all cross the security boundaries (Peter Aiken, 2013).
The Bell-LaPadula Confidentiality model is said to be the first mathematical model with the multilevel security policy that is useful in defining concepts of the secured models and state machines and even the outlined rules for its access. It enforces many confidentiality aspects of the access models. The model is noted to focus on ensuring that subjects with various clearances are well-authenticated b having the basic security clearance ideas of knowledge and the formal access approval just before accessing the objects under classification criteria. It has several rules, such as the star property rule, which states that a subject in a particular security level cannot write information on top of the lower security levels. Also, the simple security rule, the strict star property rule, tranquility principle, and many more (Orondo, 2009).
Anderson, C. (2015). Creating a data-driven organization: Practical advice from the trenches. O’Reilly Media.
Gouin, B. (2007). Security measures. Strategic Security Management, 183-215.
OroSSndo, P. O. (2009). An alternative model of information security investment. Handbook of Research on Social and Organizational Liabilities in Information Security, 133-140.
Park, S. (2007). Strategies and policies in digital convergence. IGI Global.