Responsive Database Security Plan

Objective———————Through this real-world project you will design a secure, scalable, and responsive database security plan and requirements definition document for a system of your choice. Your chief security officer has given you the assignment of defining, developing, and documenting a database security policy and plan for your databases. This document shall define who is responsible for security in your organization and what authority is granted to that person in the advent of a security breach. Additionally, policies and procedures should be defined and documented that outline the daily administrative tasks, definition of security rules and methods, and the enforcement of those rules. Your job is not to implement the requirements but to define what the requirements are and to document them. While working on your project, assume the roles of the chief security officer, database designer, database administrator, and chief applications designer.Part 1: Project Identification and Business Environment –Address the following topics as they apply to your policy:Establish authorities and responsibilities for database security management.Develop operational and incident management procedures when security breaches are discovered.Define personnel and procedures for daily administration and maintenance of security policies.Part 2: Architecture and Operating System Considerations –Address the following topics as they apply to your policy:Define the architecture for your system. Does it use client server, web, or application servers? Given the architecture, elaborate on what methods will be used in your database to support this architecture. Consider the following elements in the formulation of your policy:Integration of DBMS security with client applications and operating systemsIntegration of DBMS security with network operationsIntegration of DBMS security with server operating systemsIntegration of DBMS security with web servers and application serversDefine requirements as they relate to database security. This includes, but is not limited to: connection pooling, proxies, application roles, file permissions, privileged accounts, password requirements, and other methods appropriate to your selection.Part 3: User Accounts and Password Administration –Address the following topics as they apply to your policy:User administrationPassword policiesProfile definitions and assignments. What is the criterion for assignment of a profile to an account?Part 4: Privileges and Roles –Address the following topics as they apply to your policy.Security model selectionRoles, including privileged roles assignment and administration and role policiesSystem privilegesObject privilegesPart 5: Database Security Operations –Address the following topics as they apply to your policyRequirements and methodology for database loggingRequirements and methodology for activity auditingPart 6: Data Isolation Policies –Address the following topics as they apply to your policy:Requirements for data isolationDatabase viewsDatabase triggersDatabase stored proceduresPart 7: Physical Environment for Secured Databases –Address the following topics as they apply to your policy:Use of physical security and control mechanisms systemsDatabase backup and restore practices relating to securityPart 8: Conclusion, Summary, and References –Develop a summary and conclusion for your paperCite your referencesHow it will be graded VVVVVVVVVVVVVProject Abstract2%Identify your project topic and scope for a key database security subject. Describe why the topic is important for our studies.Content: Organization and Cohesiveness77%Topic Selection and Project Scope: Select a subject important to database security. Develop a tangible project scope that clearly defines the deliverables of the project.Executive Summary: Given a business requirement, provide a summary presentable to executives. Avoid jargon and acronyms. The presentation is the basis for your continued employment as a security analyst and an opportunity for advancement to a supervisory position.Security Plan and Procedures: You should document your plan and procedures and support them with examples of how to implement them.Literature Review and References: Review the major literature important to your discussion. Include a listing of references for all cited articles and books used in the preparation and development of your applied research project.Evaluation Criteria:Key elements of assignments coveredContent is comprehensive and accurateDisplays an understanding of relevant theoryMajor requirements supported by specific details and examplesResearch is adequate and timelyWriter has gone beyond textbook for resourcesOrganization, Presentation, Spelling, and Grammar21%Report Presentation: Develop your Project Report in a professional format to ensure the best impact to technical reviewers.Organization and MechanicsGrammar/Punctuation/SpellingRules of grammar, usage, punctuation are followedSpelling is correctReadability/StyleSentences are complete, clear, and conciseSentences are well-constructed with consistently strong, varied structureTransitions between sentences/paragraphs/sections help maintain the flow of thoughtWords used are precise and unambiguousThe tone is appropriate to the audience, content, and assignment

 

Looking for a Similar Assignment? Let us take care of your classwork while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today! Use Code FREE15