Question: Book: Database Security and Auditing: Protecting Data Integrity and Accessibility Case 5-2 Application Security with Oracle You were hired by Acme Telecommunication Systems (ATS) to

Book: Database Security and Auditing: Protecting Data Integrity and Accessibility

Case 5-2 Application Security with Oracle

You were hired by Acme Telecommunication Systems (ATS) to implement a number of security requirements. Provide the architecture of the application security model you select and the steps to implement it. The application has the following modules:

  • Account Maintenance
  • Call Records
  • Transactions
  • Call Monitoring
  • Backup and Restore
  • Security

The following users will be accessing the system:

  • Sammy Bright
  • Tom Lord
  • Linda Glass
  • Joan Knight
  • James Howell
  • Dennis Wright
  • Ray Stevenson
  • Phil Magnet
  • Kate Davis

(Picture is additional information to the question)

Book: Database Security and Auditing: Protecting Data Integrity and Accessibility Case 5-2

ATS requested the following security implementation: ABASE APPLICATION SECURITY MODELS 205 Roles Rank Role 0 Service 1 2 Operator Supervisor Administrator CEO 3 4 Rank 0 Privileges Privilege query update delete grant 1 2 3 Module-Role Module Service Administrator CEO Supervisor delete Account maintenance query grant query Operator update update update query delete grant query delete grant Call records Transactions Call monitoring Backup and restore Security query query grant query delete grant query grant query User-Role Administrator CEO User Service Operator Supervisor X X X Sammy Bright Tom Lord Linda Glass Joan Knight James Howell Dennis Wright Ray Stevenson Phil Magnet Kate Davis

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!