100% (1)
page:
2 pages/≈550 words
Sources:
-1
Style:
APA
Subject:
Business & Marketing
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.37
Topic:

Data Protection and Security Against Computer, Network, or Media Failure

Coursework Instructions:

Assignment Content

Write a 1- to 2-page paper based on the following information:

The database you have created is critical to your organization. You want to ensure that:

The information is secure,

It is protected against computer, network or media failure,

It continues to perform well and be available as the number of users accessing and changing the data increases, and operations are applied consistently no matter what else is happening

What do you expect your team and tools to do to achieve each of these goals? For security, give consideration to external or internal attacks on the application and the database, as discussed in class, the web interface (if applicable) or the operating system. For failures, give consideration to each kind of failure. For performance and availability, consider the specified increased user and data loads, as discussed in class. For consistency, consider processes that update the same rows or tables that overlap in different ways.

Coursework Sample Content Preview:

Data Protection and Security
Student Name
Institutional Affiliation
Data Protection and Security
The database that was created in this exercise is essential to the organization. There is a need to ensure the security of the information, that it is connected against the network computer or medium failure. Further, the website should continue to perform well and be readily available, even when the number of users keeps increasing. The tools and methods of achieving these functions are described below. 
Ensuring the Security of Information
This can be achieved through various approaches. First, the login pages should be encrypted. Encryption of the sessions after one has successful access to the website is also encouraged as a way of preventing possible information. Encryption also ensures that only authorized individuals can access the website or confidential data. 
The team should also manage the web site through encryptions (Ristolainen, 2017). The use of such connections that are not encrypted or with weak encryptions like unencrypted HTTP o FTP for a web server or web site management exposes the website to such attacks as man-in-the-middle as well as password or login sniffing. As such, encrypted connections can help in avoiding such attacks.
The encryption used should also be reliable and cross-platform compatible. Owing to advanced technology, SSL is no longer the top-of-the-line technology for use in encryption of web site (Kim & Choi, 2020). As such, the team should use TLS (Transport Layer Security) since it has succeeded Secure Socket Layer encryption. This would provide more security. 
Get connected from a network that is secured (Lewis, 2019); the team should avoid connecting from systems whose security characteristics are uncertain or unknown. They should also prevent networks whose security is reduced, such as the case of open wireless access points that are found in coffee shops and malls. Such access points expose one to the risk of getting hacked. 
Further, login credentials should not be shared (Logan, 2020). Sharing login credentials could result in various issues for security. This applies to the webserver administrator and webmaster, as well as the individuals with the login credentials for the website. Therefore, clients and other users should also be warned against sharing their login credentials. 
Protection against Computer, Network or Media Failure
Once the database is created, the transaction log is by default, put in the same device and directory as the database. The arrangement does not provide any protection against all types of media failure. So the team should consider having the transaction log placed in another location to enhance production use. 
One of the ways of achieving comprehensive protection against forms of media failure is by ensuring the transaction log is kept on a different device from where the database file is saved. There are computers wi...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

Sign In
Not register? Register Now!