Information Technology A Brief Critique Of Database Essay

Information Technology A Brief Critique of Database Security Articles

The focus of both papers to be critiqued is the definition, status, and significance of database security. As many corporations such as Amazon and Google move toward using cloud computing, there is greater concern for the security of information contained within databases. Long before cloud computing (long in technology terms), database security was a primary concern in information technology. The paper will offer insight as to the validity of the arguments presented in each piece as well as significance of the topic in general.

Mashburn states that although companies utilize databases placed on the Internet, most companies are unaware of their databases' security. He claims that companies are prioritizing the convenience of using Internet databases over preventative security measures to keep the data safe. This lack of awareness will ultimately cost companies money. The data may be compromised in some way or even lost, or clients of the company may become aware of the lack of security measures surrounding their private information and...

...

He writes that security comes from clear, distinct, concise policies regarding data and actual mechanisms within the technology that can safeguard the information. This is a sound proposal. The technology alone is not at fault for lack of security. It is the responsibility of the users to ensure that the technology will function appropriately and those with appropriate access handle secure information. Company personnel needs to take more responsibility in securing database information. It is not the fault of the technology alone. Mashburn states specific measures that can be taken such as password control, patching & testing, and auditing features used by management. These measures require personal accountability and help ensure database security. Though he gives several examples, his overall point is that specificity of duty and policy is most important in database security, as well as routine maintenance.
Fountain takes a…

Sources Used in Documents:

References:

Fountain, Barry William. "Database Security." American Public University System.

Mashburn, Wayne E. "Database Security and Why is it Important?" American Public University System.


Cite this Document:

"Information Technology A Brief Critique Of Database" (2012, January 26) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/information-technology-a-brief-critique-114976

"Information Technology A Brief Critique Of Database" 26 January 2012. Web.25 April. 2024. <
https://www.paperdue.com/essay/information-technology-a-brief-critique-114976>

"Information Technology A Brief Critique Of Database", 26 January 2012, Accessed.25 April. 2024,
https://www.paperdue.com/essay/information-technology-a-brief-critique-114976

Related Documents

Ideally, Zachman thinking pattern has been challenged by time and fails to address challenges in a real-time basis collectively. Such a basis would agree that a superior usage of technology is not near-change mechanism. Zachman argues that a communication breakdown exists in the organization (by that time) because it handled the frameworks differently. This was not in line with the requirements of a desirable organization. Further to this, communication

Pedagogic Model for Teaching of Technology to Special Education Students Almost thirty years ago, the American federal government passed an act mandating the availability of a free and appropriate public education for all handicapped children. In 1990, this act was updated and reformed as the Individuals with Disabilities Education Act, which itself was reformed in 1997. At each step, the goal was to make education more equitable and more accessible to

In this case, the authors say not much is understood in terms "…of how it support for knowledge management practices in organizations affects the development of TMS (transactive memory system) (Choi, et al., p. 855). In this research, the trio of researchers have come up with several interesting findings relative to the impact of information technology. Indeed, after researching 139 technology teams (743 individuals) in South Korea, they learned that:

Self-Efficacy: A Definition Social Cognitive Theory Triangulation Data analysis Teacher Self-Efficacy Problems for the researcher Data Analysis and Related Literature review. Baseline Group Gender Deviation Age Deviation Comparison of data with other literature in the field. Everyday Integration Efficacy, Self-esteem, Confidence and Experience Barriers to use Integration paradigm. Co-oping and Project design. Organizational Climate Teacher Integration Education. Meta-evaluation of data and related literature. Data Analysis and Comparison Recommendation for Further Research Data Review Report Teacher efficacy in the classroom is facilitated by a number of different factors for different professions. However,

DB Post Social Web and You Explain how social media/web is changing or has changed the ways you, your family, and colleagues find information. Also, how has social media/web changed the ways you interact in your personal and professional life as well as within academic spheres? What functionalities do you think will be invented in the future? Make sure you support your argument with facts, figures, and intelligent analysis. Also, consider

For the purposes of this review, Web-based instruction is considered to be any educational or training program distributed over the Internet or an intranet and conveyed through a browser, such as Internet Explorer or Netscape Navigator. Java applet-based instruction is a special form of Web-based instruction. Although there is very little research on comparing the effectiveness of Java applet-based instruction to the traditional face-to-face offering. However Web-based instruction has received enough