Question: You are a database security professional working for an online retail clothing chain. Orders may be placed in two ways: Customer entry on your website
You are a database security professional working for an online retail clothing chain. Orders may be placed in two ways:
- Customer entry on your website
- Employee entry based on a phone call from the customer
- Describe two security threats to your database security, for each of the ordering methods and explain the risks associated with each.
- Based on your readings and additional research, suggest the most effective database security techniques to mitigate these threats. Justify your suggestions.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
