DBMS Security It Is Unrealistic Term Paper

DBMS Security

It is unrealistic to assume that all levels of management, including all functional areas of any organization can have in-depth expertise in application security and development. Instead of relying on a few security experts to ensure application- to DBMS-level security is achieved, guarding against inbound security attacks through Web-based interfaces of applications and websites, companies need to create a Governance, Risk and Compliance (GRC) strategy. This GRC strategy must encompass risks by each management level within the company, with specific attention paid to the application development processes in the company. The GRC strategy must extend past the Multifactor Security Model mentioned in the reading and define security standards and tests to ensure programming based on JavaScript, J2EE development tools, and Web 2.0 applications. The purpose of the GRC strategy is to also define regression and security testing of each new application before it is released onto the website or for external use.

Further, the GRC strategy must also define continual security standards in terms of internal training and learning. Instead of responding to each threat the GRC strategy must also focus on planning an agenda of deterrence and control over threats. This aspect of the GRC strategy would lead to the development of programming standards that would audit all new applications to make sure they were impenetrable by SQL Injections and other threats. The knowledge gained from these security tests would in turn be used to refine and more precisely target potential security threats, becoming part of the GRC strategy over time. Database security needs to be part of a broader GRC strategy to alleviate risk while ensuring system agility so it can be used as a competitive advantage over time. Only by defining security strategies by level of management and functional area can the intricacies of database security be effectively managed over the long-term in any company.

Cite this Document:

"DBMS Security It Is Unrealistic" (2008, June 12) Retrieved May 4, 2024, from
https://www.paperdue.com/essay/dbms-security-it-is-unrealistic-29362

"DBMS Security It Is Unrealistic" 12 June 2008. Web.4 May. 2024. <
https://www.paperdue.com/essay/dbms-security-it-is-unrealistic-29362>

"DBMS Security It Is Unrealistic", 12 June 2008, Accessed.4 May. 2024,
https://www.paperdue.com/essay/dbms-security-it-is-unrealistic-29362

Related Documents

How will JavaScript Technology change my life The best benefit of all of learning JavaScript, its syntax, integration with XML and AJAX is the how marketable this skill is today. Being able to define which rich client is best for a given need is an essential skill going forward in any programming or technical career (Zeichick, 2008). JavaScript will hopefully give me an opportunity to earn more money over time. What are

Java Vs. Javascript
PAGES 3 WORDS 923

Java vs. JavaScript Java was introduced by Sun Microsystems in 1995. The programming language designed for use in the distributed environment of the Internet (TechTarget). Although it was designed to have the "look and feel" of the C++ language, it offers greater ease of use and enforces an object-oriented programming model. Programmers can use Java to create complete applications that may run on a single computer or be distributed among servers

Asynchronous JAVA Script & XML (AJAX) Asynchronous JavaScript and XML (AJAX) are set of technologies with different function that work together to allow the client-server to create a rich web application (Deursen & Mesbah, 2009). The purpose of this paper is to describe more about AJAX, how is it used to create a web application, the difference from classical web application, companies utilizing this technique, security issues, and how to migrate

The report develops mathematical model and Excel is ideal spreadsheet to implement a mathematical model because it is developed to carry out a number of iteration. The report uses the spreadsheet to determine the time that the engine takes to reach 3000 rpm with continuous 100% fuel input. The Table 1 provides the layout of the spreadsheet, which reveals the time on the first row and the system variables on

Cross Platform Mobile and Web
PAGES 63 WORDS 17284

82). Both desktop and Web widgets have the same basic components. Fundamentally, they use Web compatible formats, even if intended to run in a desktop environment. This means that the core of the widget is HTML and CSS code which contains the actual content of the widget, namely text, linked images/video or content pulled from a server of Web service. Alternatively, the widget content can be created using Flash, although

Is Dhtml Dead
PAGES 2 WORDS 689

DHTML dead? In the view of many pundits there seems to be little doubt that DHTML has seen its best days and is, in terms of serious development, a dead issue. As Russell Jones writing for DevX.Com, states: The bottom line is: DHTML is dead for serious application development; browsers, as application delivery platforms, are past their peak; and the future of distributed, interactive applications -- at least on Windows --