Examining the Challenges to the Efficacy of School Database Security
This study will address the issues surrounding data security in the colleges. Some of these issues include the history of database formation, technology implementation, security products, and cost analysis. These issues are addressed in order to assess the current state of data security in colleges and to make recommendations for improvements. As compared to small businesses, higher educational institutions are more vulnerable to these attacks because they may lack the financial resources and expertise to develop a comprehensive information security system. This is because the potential of revenue generation is higher in small businesses rather than higher educational institutions . Lacking principles and methods, an organisation is especially susceptible to attacks from insiders who have direct access to the institutions computer system. The objective of this study is to gather information about the IT-related security issues in educational institutions. The outcome of this study is the results of examination of challenges to the efficacy of school database security.
Table of Contents
Chapter 1: Introduction5
Chapter 2: Literature Review12
Information Security and Database get access to Control18
Securing the Database19
Securing Sensitive Data21
Accesses to the Database22
What Employees Can Do Wrong?27
Customer Service and Business Operations Employees27
Application Systems, Database Administration, Technical Support, and Maintenance27
Recommended Approach: Concentrate Database Access Control at the Source30
Database Security Concepts31
Networks and Communication Security Management64
Security and Contingency Management64
Security and Contracting Management64
Chapter 3: Methodology65
Overview of Qualitative and Quantitative Research Approaches65
Overview of the Mixed Method Research Approach67
Research Method and Design Appropriateness67
Benefits and Disadvantages of Mixed Method68
Literature Selection Criteria72
Chapter 1: Introduction
Global expansion of the Internet, dropping computer prices and a growing list of submissions are convincing enterprises of every size to rely on computers to shop, organise and transmit vital information. This information is still not in consideration of hackers, cyber criminals and insiders who request to steal from or impair an organisation (www.isaca.org). A disgruntled worker, an overzealous competitor, a searching hacker or a cyber robber could all be causes of an attack against an organisation's computerised information. While their motives may alter, persons planning an strike have a wide array of strike options (Weber 2006 74).
Erasing a clientele data groundwork, planting a virulent virus, rifling through correspondence documents, sending a Trojan equine, making a replicate staff records and searching for credit business card numbers are just a couple of the attacks that may be directed at the victim's data expertise (IT) system (Weber 2006 74). The use of IT has become more widespread and today's educational institutions heavily rely on the security of data schemes that it would be impossible to manage without them. The development of e-business and e-commerce submissions also presents abundant possibilities for un-authorised access to the secured information.
Intuitively, little enterprises are more vulnerable to these attacks because they may need the economic resources and know-how to develop a comprehensive information security system. Lacking policies and procedures, an organisation is particularly susceptible to attacks from insiders who have direct access to the ...