Discussion:Data Security
As with any database, data integrity is important to the software database at Granfield College. If the data are audited, they have to show that they know what software they have, how it is licensed, and on which machines it is installed. Accident and error are the most likely threats to their data integrity, but it is always possible that someone might try to purposely disrupt their data.
1. Create tables of the data access needs of your users.
2. Create a security plan that includes authentication and authorization with appropriate general policies and procedures. Consider the use of roles, stored procedures, views, and other tools.
3. Document and define all the aspects of your plan. Provide support for your choices.
4. Create a preliminary threat analysis.
5. Make a preliminary disaster management plan.
6. Create a view of the data that is tailored to the needs of one of your users.