You have been hired as a security professional for your company. You are to crea
ID: 3857258 • Letter: Y
Question
You have been hired as a security professional for your company. You are to create and implement a white box informal database security testing schedule for the organization. Create a paper that addresses the following: • Create a table that includes a rotating schedule for the 12 months of security testing. Include columns that identify time estimations for each test listed. • Create a planning and preparation checklist common to all security tests as a whole. • Identify any special planning and preparation needed for each test. • Identify the scope for each test and identify any special considerations that need to be addressed. • Create a list of at least five testing activities for each audit. • Provide recommendations for securing the database that are unique to Oracle. • Provide recommendations for securing the database that are unique to MySQL. • Provide recommendations for securing the database that are unique to SQL Server.
Explanation / Answer
To create and implement a white box informal database security testing schedule for the organization.
We should maintain the security planning in an organisation as follows:
Create a planning and preparation checklist common to all security tests as a whole.
- Developing a security team mission statement that will be used in an company or in an organizational with there goals
- In order to make the security team more successful we should try to Learn to identify, understand, and manage customers.
- In order to have better understand business goals we should Identify market forces that drive the business in present days.
- we always make sure of business and there Understanding on doing business and how business leaders develop strategy
- Make more informed purchase decisions to Apply analysis on security vendors
- Understand the hackers and attacker motivations and techniques in all aspects
- Understand assets and process of business that are most valuable to the business.
- Learn the strategic planning of kill chain and threat intelligence.
The purpose of security and the Roadmap Development are.
- In order to align security with the corporate culture we should Understand the values and culture of your organization
- Understand the current Strengths and the Weaknesses, and Opportunities, and Threats in the business.
- Identifying what needs to be done in the company or in an organisation.
- Identifying what should be done first in business.
- Approaches to obtaining funding
- Promoting the work of the security team
- Developing effective metrics and Dashboards in the business
- Learning to innovate with the business so that it will be useful to business development
Identify any special planning and preparation needed for each test
- we must know the Security managers we must understand how to review, write, assess, and support security policy and procedures.
- we must know the understand the Role of policy
- we must know the how to Establishing acceptable bounds for behavior in the company.
- we must know the Leading the employees to do the right thing
- we must know How policy protects people, organizations, and information
- we must know the Relationship of mission statement to policy
- we must know the Policy versus procedure
- we must know the Policy needs assessment
- we must know the Governing policy
- we must know the Issue-specific policy
- we must know the Positive and negative tone
- we must know be Using the SMART approach
- Policy review and assessment process
- we must know the Role of psychology in implementing policy
- we must know the Organizational culture
Identify the scope for each test and identify any special considerations that need to be addressed.
- We all must know about the Leadership of developing the organisation.
- we should Creating and Developing the entire working team.
- we should give them better Coaching and Mentoring the team
- we always maintain the Customer Service Focus
- we should rectify the Conflict Resolution
- We should maintain the Effective Communication
- Leading through Change
- There must be a Relationship Building within the team.
- Motivation and Self-direction
- There must be a effective Teamwork
- There must be Leadership Development
Create a list of at least five testing activities for each audit
- we should Create the Security Plan for the CEO
- we should Understanding Business Priorities
- we must Enable Business Innovation
- we should Work with the BYODs
- we should maintaint the Effective Communication
- we should know all the Stakeholder Management
The recommendations for securing the database that are unique to Oracle are:
- Oracle Database leads the industry in security.
- In any business environment or a company or a big organisation, it is very informative and secure that the database itself be well protected.
- Oracle Database Minimizing the costs of equipment, personnel, and training
- Oracle Database Minimizing delays and errors
- Oracle Database Maximizing rapid and thorough accountability.
The recommendations for securing the database that are unique to MySQL are:
- MySQL is very secure database and it is used for Securing the servers in an company or organisation.
- MySQL can Disable or restrict remote access of end users.
- MySQL can prevent unauthorized reading from local files.
- MySQL can Lower database privileges
- The default administrator username on the MySQL server is “root”. So it can Change root username and password
- MySQL comes with a test database intended as a test space. It can be accessed by the anonymous user, and is therefore used by numerous attacks.
- MySQL can Remove Anonymous and obsolete accounts
- MySQL can Lower system privileges and it can increase database security with Role Based Access Control.
The recommendations for securing the database that are unique to SQL Server.
- With help of SQL server we can encrypte the database backups.
- Using the SQL Server we can Secure the database backup folder by removing unwanted users.
- Using the SQL Server security best practice everyone should use Windows Authentication to connect to SQL Server for better security.
- Make the system administrator account's password complicated.
- By Using the SQL Server we can audit failed logins to SQL Server.
- By Using the SQL Server we can Turn off the SQL Server browser service
- By Using the SQL Server we can Disable features such as XP_CMDSHELL, OLE AUTOMATION, OPENROWSET and OPENDATASET
- By Using the SQL Server we can Decrease privileges for the SQL Server service account
-
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.