Tuesday, June 18, 2019
DBMS Support and Security Research Paper Example | Topics and Well Written Essays - 1250 words
DBMS Support and Security - Research Paper Exampleought to adopt security strategies, for instance, tagging data with a level of confidentiality to make sure scarce those permitted have access to such data (Connolly and Begg 2009).Security strategies are designed as the overall plans to mitigate risk. As mentioned earlier, most organizations have security strategies, only if miss out on database security or do not adequately address the issue. A comprehensive security strategy must change magnitude the overall possibility of loss or harm to an organizations data. Furthermore, the strategy must focus on the business data concerns from a statutory, contractual and legal perspective. There exist multiple regulatory standards and requirements that have imposed on the organization to address information security risks. Contracts are making it indispensable to organizations to consider security of their data at all levels.Proactive database security fudgement and planning can save or ganizations significant amounts of money and reduce the overall exposure to risk. Striking a balance between the organizational objectives and security requirements is a task that squarely falls on the IT department. They are charged with develop the ICT policy for companies in consultation with management, operational support and other stakeholders. The policies aim to increase the benefits of implementing IT in business.A comprehensive support and security strategy should abut on the following areas. First, it should have a clear definition of organizational control objectives and have controls to meet those objectives. The organizational control objectives are the processes of evaluating, assigning and modulate resources on a continuous basis to meet organizations goals. It should then have feasible approaches to meet the objectives with metrics and/or benchmark standards to manage the controls. It is also necessary to have a clear implementation of the controls and have testi ng and maintenance tasks while going forward.The motivation
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.