Writing Homework Help
Grand Canyon University Database Security Discussion
reply to each DQ
Chere:
To prevent access to private data, Hadoop pertaining to security polices, configuration, web interface and software and technology herterogeneity. Other functions are to secure hardware systems. “For instance, in [31] a light weight security mechanism
known as Lightweight Security Scheme (LSS) is defined. In [32], an algorithm named Flexible and Efficient
Encryption (FEE) is defined to deal with structured data security and data dynamics on the encrypted data that
has been outsourced”(Sirisha, 2021). Many of the other factors is preserving and maintianing the privacy of data analysis. “Adithamet al. [11] proposed different thread detection mechanisms that may arise from malicious insiders. Their solution includes profiling process behavior using library and system calls and memory access patterns. After building process profiles, they are verified dynamically at runtime to know any discrepancies “(Sirisha, 2021) . Examples of data dictionary would be “With Airavat, the data providers are assured to have secure and privacy preserving data analytics. Airavat supports DP for preventing leakage of sensitive data. With Airavat, the data providers are assured to have secure and privacy preserving data analytics. Principal
Component Analysis (PCA) and Singular Value Decomposition (SVD) methods are employed to estimate”(Sirisha, 2021). MapReduce is a big computing able to maintain large amount of information. However it is subject to inference attacks so there is often use of Airavant.
violations. Airvant came into existiance to prevent big data and privacy.
Sirisha, N., S., & Kiran, K., D. (2021). Integrated Security and Privacy Framework for Big Data in Hadoop MapReduce Framework. Turkish Journal of Physiotherapy Rehabilitation , 32(2), 2428-2447.
Nicole:
The database administrator, or DBA, is responsible for managing and altering the database as needed. They ensure that database systems are backed up and functioning properly. They also must ensure that the information being stored within the database is protected and accurate. Protecting data security, privacy, and integrity is of utmost importance and the responsibility can be a tough task with technology advancing so rapidly. They also must comply with the Health Insurance Portability and Accountability Act, or HIPAA, for short. The textbook explains different SQL functions that may be used when dealing with data dictionaries. The first example they list is to add the names and creation dates by a particular user. The SQL statements for this would be:
SELECT NAME, CTIME
FROM SYSTABLES
WHERE CREATOR = ‘JONESVI’; (Coronel & Morris, 2017).
Having this information would allow database administrators to more closely monitor what is being added and by who.
Coronel, C., & Morris, S. (2017). Database systems: Design, implementation, and management (13th ed.). Cengage Learning.
Jennifer:
An organizations data is considered a valuable corporate asset thus protecting its security, privacy, and integrity are vital. A DBA plays a key role in this. The DBA’s managerial role includes the planning, organizing, testing, monitoring, and delivering of the data and database (Coronel & Morris, 2017). Planning involves providing end-user support which includes providing the data and information needed to their departments and resolving conflict and problems. The organizing activity requires “the continuous enforcement of policies, procedures, and standards for correct data creation, usage, and distribution with the database” (Coronel & Morris, 2017). Through testing and monitoring the DBA ensures the security of the database as well as ensuring that it is backed up to protect it from loss. The data protected in the database is only useful if the people that need it can access it so delivery of the data is another important job of the DBA.
A data dictionary can be used to manage the organizations information and who has access to it. SQL statements that can be used to monitor the security of the database by granting and removing a user’s access and by defining what the user can actually do or has done in the database. The SQL statements CREATE USER and DELETE USER can be used to add or delete a user in the database. ALTER ROLE can be used to change what a user can do in the database.
This SQL statement allows the DBA to so see all names of tables created by the user Jones and the date they were created.
SELECT NAME, CTIME
FROM SYSTABLES
WHERE CREATOR = ‘JONESVI’:
Coronel, C., & Morris, S. (2017). Database systems: Design, implementation, and management (13th ed.). Cengage. ISBN 13: 9781337627900