Marcia’s Dry cleaning case:
sabiva_tulepqtl1
Marcia’s Dry cleaning case:
Data Security
As with any database, data integrity is important to the software database at Granfield College. If the data are audited, they have to show that they know what software they have, how it is licensed, and on which machines it is installed. Accident and error are the most likely threats to their data integrity, but it is always possible that someone might try to purposely disrupt their data.
1. Create tables of the data access needs of your users.
2. Create a security plan that includes authentication and authorization with appropriate general policies and procedures. Consider the use of roles, stored procedures, views, and other tools.
3. Document and define all the aspects of your plan. Provide support for your choices.
4. Create a preliminary threat analysis.
5. Make a preliminary disaster management plan.
6. Create a view of the data that is tailored to the needs of one of your users.
7. Copy and paste a complete copy of this report into your journal.
- 8 years ago
- 20
- ACC 380 Week 5 Final Project
- @ hifa shaukat....Please select ONE of the following to conduct this week's journal review. You should submit your review here no later than Friday.
- 3 page paper
- What elements are not necessary to distinguish when making generalizations about a work of nonfiction?
- Lab 04/MODULE 14: WEATHERING AND MASS WASTING
- in at least 100 words answer the following
- Homework Pro only Phase 5
- Massively Multiplayer Online Role-Playing Games (MMORPGs)
- economics....400 words...needed in 12 hours or less
- Fair Shares