2–3 page paper that covers the following: It seems that authorities are going th
ID: 3869175 • Letter: 2
Question
2–3 page paper that covers the following: It seems that authorities are going through computers and servers seized from the criminals' offices and have identified more than 20 companies that may have had their customer and retail transactions compromised. One of the companies listed, it turns out, was your company, which you have been employed as a database administrator for the past nine years.Explain the tools available to database administrators that would prevent security breaches such as the one that may have occurred at a company. Describe the strategies that are available to database administrators that would prevent security breaches such as the one that may have occurred at a company. Identify the laws, rules, and standards that may be applicable to a company and this possible security breach. 2–3 page paper that covers the following: It seems that authorities are going through computers and servers seized from the criminals' offices and have identified more than 20 companies that may have had their customer and retail transactions compromised. One of the companies listed, it turns out, was your company, which you have been employed as a database administrator for the past nine years.
Explain the tools available to database administrators that would prevent security breaches such as the one that may have occurred at a company. Describe the strategies that are available to database administrators that would prevent security breaches such as the one that may have occurred at a company. Identify the laws, rules, and standards that may be applicable to a company and this possible security breach. 2–3 page paper that covers the following: It seems that authorities are going through computers and servers seized from the criminals' offices and have identified more than 20 companies that may have had their customer and retail transactions compromised. One of the companies listed, it turns out, was your company, which you have been employed as a database administrator for the past nine years.
Explain the tools available to database administrators that would prevent security breaches such as the one that may have occurred at a company. Describe the strategies that are available to database administrators that would prevent security breaches such as the one that may have occurred at a company. Identify the laws, rules, and standards that may be applicable to a company and this possible security breach.
Explanation / Answer
The tools available to database administrators that would prevent security breaches are:
- The tool like Adminer which allows to manage databases,tables,columns,users,relations, indexes, permissions, and user interface using in web.
- The tool like DBComparer which allows to compare and analyse the differences in Microsoft SQL database
structures from an easy-to-use UI.
- The tool called Firebird which is a very powerful and lightweight SQL relational database with open source which is managed onlyu on Windows and Linux.
- The tool called FlySpeed SQL Query which is a database query tool that aims to make working with data easy.
- The tool called HeidiSQL which is a database query tool that supports MySQL, PostreSQL databases and Microsoft SQL Server.
The strategies that are available to database administrators that would prevent security breaches and the laws, rules, and standards that may be applicable to a company and this possible security breach are:
- Always Change the default passwords for the default users.
- And Do not reuse the same passwords.
- when ever an employee is in leave Always disable the user accounts.
- Always track the logs in the server or systems and examine all kind of security logs in servers.
- Always do the regular network scans in the server or system.
- Always monitor the outbound network traffic in order to avoid the Malware detection.
- Always patch the systems and updates which are available and Keep the operating system and application software up to date.
- Always have plan for security precautions and implement the security plan.
- In between the clients and vendors raise user awareness about the security info.
- And have the management support to implement the security plan.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.