Tuesday, October 8, 2019
DBMS Support and Security Research Paper Example | Topics and Well Written Essays - 1250 words
DBMS Support and Security - Research Paper Example ought to adopt security strategies, for instance, tagging data with a level of confidentiality to make sure only those permitted have access to such data (Connolly and Begg 2009). Security strategies are designed as the overall plans to mitigate risk. As mentioned earlier, most organizations have security strategies, but miss out on database security or do not adequately address the issue. A comprehensive security strategy must lessen the overall possibility of loss or harm to an organizationââ¬â¢s data. Furthermore, the strategy must focus on the business data concerns from a statutory, contractual and legal perspective. There exist multiple regulatory standards and requirements that have imposed on the organization to address information security risks. Contracts are making it necessary to organizations to consider security of their data at all levels. Proactive database security management and planning can save organizations significant amounts of money and reduce the overall exposure to risk. Striking a balance between the organizational objectives and security requirements is a task that squarely falls on the IT department. They are charged with developing the ICT policy for companies in consultation with management, operational support and other stakeholders. The policies aim to increase the benefits of implementing IT in business. A comprehensive support and security strategy should touch on the following areas. First, it should have a clear definition of organizational control objectives and have controls to meet those objectives. The organizational control objectives are the processes of evaluating, assigning and regulating resources on a continuous basis to meet organizationââ¬â¢s goals. It should then have feasible approaches to meet the objectives with metrics and/or benchmark standards to manage the controls. It is also necessary to have a clear implementation of the controls and have testing and maintenance tasks while going forward. The motivation
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.