Security Breach of a Database

Published: 2021-07-06 06:35:30
essay essay

Category: Computer Sciences

Type of paper: Essay

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Hey! We can write a custom essay for you.

All possible types of assignments. Written by academics

GET MY ESSAY
Explanation of the tools that are available to database administers to prevent security breachesDatabase security tools are essential components of overall database security. They come in handy in many situations to avert security attacks, breaches and threats to an extent and protect the safety of vital data on the computer network. In the following, there are descriptions of certain tools that can protect the database from any form of hacking attack.MSSQL DataMask Any organization can make this mistake of using production data as test databases for different experimentations. To avoid this MSSQL is a tool that provides IT, professionals, the ability to mask data for any testing purpose such as development or outsourcing projects that involves databases from SQL servers. An unmasked production data that is used for any testing purpose has a severe threat of a security breach such as getting stolen or being contaminated. MSSQL allows data to masked that can be categorized as personally identifiable, personally sensitive or commercially sensitive.ScubaThis is a free database security tool from Imperva. This is a very handy security tool that can scan and analyze more than 2000 problems in a network with a sensitive database. These problems can be weak passwords, missing patches, known configuration risks. Scuba is popularly being used over enterprise networks as a database patch up enhancer. It is noticeable that missing patches on a database or any other server create an opportunity for hackers to break into networking systems.AppDetectivePro It is a software that scans database and big data store and as a result immediately identifies configuration problems and issues with access control, absent patches or toxic combination of settings that can appear in the form of certain common security attacks by hackers such as escalation of privileges or denial of services attacks, data leakage and unauthorized alteration of data (“Top 10 Database Security Tools You Should Know”, 2017).Strategies available to database administrators that would prevent security breachesIt is important to come up with robust strategies to protect the data in data base systems to ensure proper work flow of organizational affairs in a secure and effective manner.Strategy#1. A good practice includes database and data host server security hardening and proper patching, but along with this step proper vetting of database administrators and effective user, management is also necessary to mitigate security threats (“Database administration security strategy,” 2017).Strategy#2. Never allow excessive default database privileges that exceed the job description or job requirements. As an example as a banking worker with a job that requires altering only the account bearer’s contact information in the database can abuse his or her privileges to add to the balance of the colleague’s saving account. Moreover, many organizations ignore to update access rights of employees who are promoted or demoted on a job role in an organization or leave altogether leaving a loop hole in the body for a breach. These account update and audit issues should be strictly dealt with.Stretegy#3. Take strict measure against SQL injection and NoSQL injection attacks. Since the SuperMart is moving ahead to acquire a data ware house, they will be dealing with big data, and the SQL databases may be upgradable to NoSQL. In both, the cases when you have a SQL database or a NoSQL database have the best technology in place to have a safe guard against this highly common form of database attacks.Strategy#4. Always keep the anti-malware technology updated to have a sufficient safeguard against malware infection of the database of the organization and have regularly automated and a manual scan and measure the level and the risk of infection of the network (“Top Database Security Threats and How to Mitigate Them,” 2017).Identification of laws, rules, and standards that may apply to retail chain (like SuperMart) security breachIn the following, certain laws, rules, and standards can be implemented to SuperMart security breach.Payment Card Industry Data Security Standard (PCI DSS). The PCI DSS is a set of rules that ensures the security of customer account data information who make the payment of goods at retail stores. The important bodies that get affected include retailers like SuperMart.Electronic Fund Transfer Act, Regulation E. Enacted in 1978, this law protects the rights of consumers that engage in electronic fund transfer from errors and frauds. This law encompasses Point of Sale (POS) security also that many retail stores like SuperMart utilize. Other ways of fund transfer may also include transactions made on the internet where most security breach attacks originate.Fair and Accurate Credit Transaction Act (FACTA), including Red Flags, Rule. It helps consumers of retail stores and other online markets from identity theft. This law also facilitates accuracy and privacy of information, and in a data breach a hacker may steal this information and misuse it (Staff, 2017).ReferencesTop 10 Database Security Tools You Should Know. (2017). InfoSec Resources. Retrieved 27 July 2017, from http://resources.infosecinstitute.com/top-10-database-security-tools-know/#grefDatabase administration security strategy. (2017). ComputerWeekly. Retrieved 27 July 2017, from http://www.computerweekly.com/opinion/Database-administration-security-strategyTop Database Security Threats and How to Mitigate Them. (2017). SHRM. Retrieved 27 July 2017, from https://www.shrm.org/resourcesandtools/hr-topics/risk-management/pages/top-database-security-threats.aspxStaff, C. (2017). The security laws, regulations and guidelines directory. CSO Online. Retrieved 27 July 2017, from http://www.csoonline.com/article/2126072/compliance/compliance-the-security-laws-regulations-and-guidelines-directory.html

Warning! This essay is not original. Get 100% unique essay within 45 seconds!

GET UNIQUE ESSAY

We can write your paper just for 11.99$

i want to copy...

This essay has been submitted by a student and contain not unique content

People also read