Answered You can hire a professional tutor to get the answer.
Part 2. Exercise Questions Refer to the following scenario for Questions 1, 2, and 3: You are a database administrator working for a national bank...
Part 2. Exercise Questions
Refer to the following scenario for Questions 1, 2, and 3: You are a database administrator
working for a national bank institution. One day, a lead developer sends you an e-mail requesting
that you perform a data change. In the e-mail, he stresses the urgency and importance of this task.
A minute later, you receive another e-mail but this is from the lead developer's manager to
confirm the data change. This is the first time you have ever received this type of request.
Usually, all requests go through the change management process. You can answer the question
from a framework of CIA.
Question 1. List the security issues involved in this incident.
Question 2. Describe the type of risks involved if you comply with the request and the types of
risk involved if you do not.
Question 3. Explain briefly how you would react to this incident, outlining your reasoning and
whether you would comply or not.
Question 4. define the principle of least privilege. Why is this an important
concept to database security?
Question 5. describe the concept of defense in depth as it pertains to
information security. List and explain at least three examples of security measures that can be
implemented in a "defense in depth" strategy.