Thursday, 23 November 2017

CIS 515 Week 10 Discussions



CIS 515 Week 10 Discussion 1

"Database Administrator’s Role" Please respond to the following:
  • Information professionals with adequate skills are required to maintain the business continuity of database services in an organization. Identify and assess at least three professional skills that would be required to be successful database administrators.  
  • Give your opinion on what the critical nature of a database administrator’s role is to IT industry organizations. Support your answer with specific examples of functions and responsibilities they perform.

















CIS 515 Week 10 Discussion 2


"Database Security" Please respond to the following:
  • Confidentiality, integrity, and availability are the three common security goals. Select at least three security vulnerabilities that could jeopardize and compromise a database.  Classify each vulnerability with being technical, managerial, cultural, or procedural. Provide your rationale.
  • Suggest specific actions that could be performed to minimize the vulnerabilities identified in Question 1 of this discussion. Describe how often these measures should be performed and the order in which each should be performed.  

CIS 515 Week 10 Discussions


CIS 515 Week 10 Discussion 1

"Database Administrator’s Role" Please respond to the following:
  • Information professionals with adequate skills are required to maintain the business continuity of database services in an organization. Identify and assess at least three professional skills that would be required to be successful database administrators.  
  • Give your opinion on what the critical nature of a database administrator’s role is to IT industry organizations. Support your answer with specific examples of functions and responsibilities they perform.

CIS 515 Week 10 Discussion 2

"Database Security" Please respond to the following:
  • Confidentiality, integrity, and availability are the three common security goals. Select at least three security vulnerabilities that could jeopardize and compromise a database.  Classify each vulnerability with being technical, managerial, cultural, or procedural. Provide your rationale.
  • Suggest specific actions that could be performed to minimize the vulnerabilities identified in Question 1 of this discussion. Describe how often these measures should be performed and the order in which each should be performed.  

No comments:

Post a Comment

Note: only a member of this blog may post a comment.

FIN 317 Financing an Expansion Assignment

  FIN 317 Financing an Expansion Assignment   Financing an Expansion Overview After 12 years, your business is wildly successful, with multi...