Answered You can hire a professional tutor to get the answer.

QUESTION

Part 2. Exercise Questions Refer to the following scenario for Questions 1, 2, and 3: You are a database administrator working for a national bank...

Part 2. Exercise Questions

Refer to the following scenario for Questions 1, 2, and 3: You are a database administrator

working for a national bank institution. One day, a lead developer sends you an e-mail requesting

that you perform a data change. In the e-mail, he stresses the urgency and importance of this task.

A minute later, you receive another e-mail but this is from the lead developer's manager to

confirm the data change. This is the first time you have ever received this type of request.

Usually, all requests go through the change management process. You can answer the question

from a framework of CIA.

Question 1. List the security issues involved in this incident.

Question 2. Describe the type of risks involved if you comply with the request and the types of

risk involved if you do not.

Question 3. Explain briefly how you would react to this incident, outlining your reasoning and

whether you would comply or not.

Question 4. define the principle of least privilege. Why is this an important

concept to database security?

Question 5. describe the concept of defense in depth as it pertains to

information security. List and explain at least three examples of security measures that can be

implemented in a "defense in depth" strategy.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question