Assume that you are the database security analyst for the TECHTEC LLC. The employees are mostly...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Assume that you are the database security analyst for the TECHTEC LLC. The employees are mostly working in shift basis. When 50% of the employees are working from home due to the covid-19 pandemic by accessing the database for the salary details, shift schedule and feedback the others are in the company. The Sales table is used by different users. But the data what they see may be different. In one table not all the columns or rows are allowed for a user. The user security level is mentioned in brackets. a. The Technician(C), Manage(S)r, Supervisor(C), Managing Director(TS) and Workers (U) are the users in the system. They should be allowed to see what they are privileged for based on their security clearance. Other data must be hidden. Which mechanism will you use to manage this requirement in your database system? Design your own employee table. Write down the SQL statement to create the table and add records (10 records) and illustrate the mechanism with examples from the given scenario. b.Design a password policy for the user's account password usage (History). It should include how many days to wait before changing the password and how many times the same password can be used. Write down the policy statement clearly. c. Implement the policy designed in question b using the Profile. Use appropriate SQL commands and you can use any name for the profile starting with FinalB. [Example; Finalprof] Assume that you are the database security analyst for the TECHTEC LLC. The employees are mostly working in shift basis. When 50% of the employees are working from home due to the covid-19 pandemic by accessing the database for the salary details, shift schedule and feedback the others are in the company. The Sales table is used by different users. But the data what they see may be different. In one table not all the columns or rows are allowed for a user. The user security level is mentioned in brackets. a. The Technician(C), Manage(S)r, Supervisor(C), Managing Director(TS) and Workers (U) are the users in the system. They should be allowed to see what they are privileged for based on their security clearance. Other data must be hidden. Which mechanism will you use to manage this requirement in your database system? Design your own employee table. Write down the SQL statement to create the table and add records (10 records) and illustrate the mechanism with examples from the given scenario. b.Design a password policy for the user's account password usage (History). It should include how many days to wait before changing the password and how many times the same password can be used. Write down the policy statement clearly. c. Implement the policy designed in question b using the Profile. Use appropriate SQL commands and you can use any name for the profile starting with FinalB. [Example; Finalprof]
Expert Answer:
Answer rating: 100% (QA)
a To manage the access control requirements in the database system we can use RoleBased Access Contr... View the full answer
Related Book For
Principles of Auditing and Other Assurance Services
ISBN: 978-0078025617
19th edition
Authors: Ray Whittington, Kurt Pany
Posted Date:
Students also viewed these programming questions
-
The new line character is utilized solely as the last person in each message. On association with the server, a client can possibly (I) question the situation with a client by sending the client's...
-
Give Correct ANSWERS Human-Computer Interaction (a) If you had been one of the original inventors of the WIMP interface, and engineers on the technical team had been sceptical about the advantages...
-
Find the laurents series f(z)= 1/(z-1)(z-2) (i) |z| <1 (ii) 1 2
-
Which of the following types of information provides a likely opportunity to earn abnormal returns on the market? (a) The latest copy of a company's annual report. (b) News coming across the NYSE...
-
a) How many milliseconds (ms) are in 1 second? b) How many microseconds ( s ) are in 1 second? c) How many nanoseconds (ns) are in 1 millisecond? d) How many microseconds are in 1 millisecond? e) How...
-
A negatively charged particle sits midway between the two magnets in Figure P28.1, at rest relative to the magnets. If the magnet on the left is twice as strong as the magnet on the right, what is...
-
In the Industrial Supply Company example (Table 4.4) it was assumed that the company's fixed assets were being used at nearly full capacity and that net fixed assets would have to increase...
-
1 Define Management? 2 Define Leadership? 234 4 Explain the Qualities of a successful leader? Define transformational leadership? 5 Explain about Decision making process? Explain the types of...
-
Write an introduction on Tesla and Toyota, covering size, history and growth of both organizations. Please include highly relevant examples of innovative end results presented for both organizations.
-
You own three stocks: 600 shares of Apple Computer, 10,000 shares of Cisco Systems, and 5000 shares of Colgate-Palmolive. The current share prices and expected returns of Apple, Cisco, and...
-
Consider two local banks. Bank A has 76 loans outstanding, each for $1 million, that it expects will be repaid today. Each loan has a 6% probability of default, in which case the bank is not repaid...
-
Consider the following two, completely separate, economies. The expected return and volatility of all stocks in both economies is the same. In the first economy, all stocks move togetherin good times...
-
Consider an economy with two types of firms, S and I. S firms all move together. I firms move independently. For both types of firms, there is a 70% probability that the firms will have a 7% return...
-
Suppose the risk-free interest rate is 2%, and the stock market will return either 28% or -10% each year, with each outcome equally likely. Compare the following two investment strategies: (1) invest...
-
You have recently been hired by Piepkorn Manufacturing to work in the newly established treasury department. Piepkorn Manufacturing is a small company that produces cardboard boxes in a variety of...
-
Two mutually exclusive investment alternatives are being considered. Alternative A requires an initial investment of $20,000 in a machine. Annual operating and maintenance costs are anticipated to be...
-
Suppose you operate a bank in a country where the central bank is expected to embark on a series of interest rate increases. Based on gap analysis, would this scenario be more likely to hurt or help...
-
Cyber risk has been recognized as a growing source of operational risk for financial institutions. Why might managing this risk at an individual firm level not be adequate?
-
Bank assets equal bank liabilities plus bank capital. a. Bank assets are the uses for bank funds. i. They include reserves, securities, and loans. ii. Over the years, commercial and industrial loans...
Study smarter with the SolutionInn App