1. Explain the security mechanisms available for a database and how the data wil
ID: 3536603 • Letter: 1
Question
1. Explain the security mechanisms available for a database and how the data will be protected.
2. Explain how to defeat SQL injection attacks since the database will be publicly accessible.
3. Outline the physical design of your database.
4. List the SQL commands you will use to create your database tables. Note: Be sure that each table has at least ten records that you create so you will be able to produce reports later on.
5. Implement the tables in Oracle%u2019s 11g relational database management system (see software requirement above) and verify its evidence through the implementation of screen shots in the written paper.
Note: Remember, this is the physical implementation of your logical design from prior assignments so your grade will reflect the degree that you are able to accurately realize your blueprints from the logical designs you developed previously. This will form the basis of your grade. In addition to submitting your SQL code for this requirement, you must submit screen shots of your tables.
Explanation / Answer
(1 Ans): Safety measures must be an integral part of any database, right from the start, at the inception and design phase. Modern approaches employed to assure the security of databases address security and protection defenses at all levels: physical, network, host, applications and data.It goes without saying that the first of such measures has to be applied starting at the physical level and to then progress right through, reaching the data level at the other end. Initially, companies have had a rather simplistic approach, mainly due to primitive and rudimentary nature of earlier attacks, as well as the simple nature and construction of the then prevalent networks with very limited complexity if any, and did therefore focus on assuring security at the physical level. That then involved basic measures such as limiting access to locations that only authorized personnel may have access to data.More recently, due to the rapidly changing and increased size as well as complexity and expansion of company information systems, AAA type measures began to be used (Authentication, Autorisation, Access).Currently the necesary security measures are far more complex. These are meant to stop the highly sophisticated attacks from external attackers, and especially, from those who may very well have access to the company
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.