Choose a IT security related company and explain what company is this and a little detail about company. Also why is it important to apply these 8 sections to the specific company.

Affordable Essays
Choose a IT security related company….
Through this real-world project you will design a secure, scalable, and responsive database security plan and requirements definition document for a system of your choice. Your chief security officer has given you the assignment of defining, developing, and documenting a database security policy and plan for your databases. This document shall define who is responsible for security in your organization and what authority is granted to that person in the advent of a security breach. Additionally, policies and procedures should be defined and documented that outline the daily administrative tasks, definition of security rules and methods, and the enforcement of those rules. Your job is not to implement the requirements but to define what the requirements are and to document them. While working on your project, assume the roles of the chief security officer, database designer, database administrator, and chief applications designer.
Question:
Need to find a company (imaginary or not) and explain what company is this and a little detail about company. Also why is it important to apply these 8 sections to the specific company. I just need a abstract for this paper about the company and these sections applied in relation to that company, not the whole paper…
Sections:
Part 1: Project Identification and Business Environment — 20 points
Address the following topics as they apply to your policy:
Establish authorities and responsibilities for database security management.
Develop operational and incident management procedures when security breaches are discovered.
Define personnel and procedures for daily administration and maintenance of security policies.
Part 2: Architecture and Operating System Considerations — 20 points
Address the following topics as they apply to your policy:
Define the architecture for your system. Does it use client server, web, or application servers? Given the architecture, elaborate on what methods will be used in your database to support this architecture. Consider the following elements in the formulation of your policy:
Integration of DBMS security with client applications and operating systems
Integration of DBMS security with network operations
Integration of DBMS security with server operating systems
Integration of DBMS security with web servers and application servers
Define requirements as they relate to database security. This includes, but is not limited to: connection pooling, proxies, application roles, file permissions, privileged accounts, password requirements, and other methods appropriate to your selection.
Part 3: User Accounts and Password Administration — 30 points
Address the following topics as they apply to your policy:
User administration
Password policies
Profile definitions and assignments. What is the criterion for assignment of a profile to an account?
Part 4: Privileges and Roles — 30 points
Address the following topics as they apply to your policy.
Security model selection
Roles, including privileged roles assignment and administration and role policies
System privileges
Object privileges
Part 5: Database Security Operations — 30 points
Address the following topics as they apply to your policy
Requirements and methodology for database logging
Requirements and methodology for activity auditing
Part 6: Data Isolation Policies — 30 points
Address the following topics as they apply to your policy:
Requirements for data isolation
Database views
Database triggers
Database stored procedures
Part 7: Physical Environment for Secured Databases — 20 points
Address the following topics as they apply to your policy:
Use of physical security and control mechanisms systems
Database backup and restore practices relating to security
Part 8: Conclusion, Summary, and References — 20 points
Develop a summary and conclusion for your paper
Computer Science homework help
With unimasteressays.com’s essay writing service, you can always rest easy knowing that when you say “write my essay”, you will get a superior quality plagiarism-free, professionally written paper. Just proceed and place an ORDER NOW.

Do You Need A Similar Assignment?

Place an order with us. Our skilled and experienced writers will deliver a custom paper which is not plagiarized within the deadline which you will specify.

Note; 6 Hours urgent orders deliver also available.

If you need more clarifications contact our support staff via the live chat for immediate response.

 

Type of paper Academic level Subject area
Number of pages Paper urgency Cost per page:
 Total: