Preview

Sidpers

Best Essays
Open Document
Open Document
2831 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Sidpers
STANDARD INSTALLATION DIVISION PERSONNEL SYSTEM (SIDPERS) SECURITY PLAN

Gladys Turnbull

Submitted to: Professor Kevin Reynolds
SEC 574 Database Security
Keller Graduate School of Management
Submitted: 22 August 2012

Abstract: SIDPERS Security Plan developed for the Virgin Islands National Guard is procedural protection of this highly sensitive database holding the personnel records of over 960 active service members and over 10,000 retirees’ skeleton military personnel records. It is with great err on caution that we recommend and enforce the highest level of tiered defense in depth security measure to maintain the confidentiality, integrity and accessibility of this data; because we know its’ compromise and/or loss will reap great distress in soldiers’ and their families’ lives.

TABLE OF CONTENT I. Project Identification and Business Environment .......................... 3 II. Architecture and Operating System Considerations
SIDPERS Architecture........................................................................3
Security Requirement..........................................................................5

III. User Account and Password Administration
User Administration.............................................................................6
Password Policies.................................................................................6
Profile definition and assignment..........................................................7

IV. Privileges and Roles
Security Model........................................................................................7
Roles........................................................................................................7
System privileges/ Object privileges ......................................................8

V. Database Security Operations
Database Logging...................................................................................8
Activity



References: 2. Click OK to close the message box. (SUM, 2011) Quality Assurance (QA) Reports - The QA Reports function is performed by running SQL scripts to identify invalid and conflicting data Afyouni, Hassan, Database Security and Auditing, Protecting Data Integrity and Accessibility, 2006 Thomson Course Technology Department of Army (AR 600-8-20) SIDPERS Handbook for Commanders, 1 April 1986; http://www.apd.army.mil/pdffiles/p600_8_20.pdf

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS3350 week 1

    • 287 Words
    • 3 Pages

    9. Security controls and security countermeasures to help protect the Master SQL Database that houses customer privacy data and intellectual property assets.…

    • 287 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    This paper gives an idea regarding the important aspects of the database security. It mainly focuses on the security parameters such as confidentiality, authenticity and availability of the data. It also explains the different threats for the security in an organization in relation to the database. The basic steps which are required to control the loss of data are explained in detail. Among the controls the encryption process is the one which has to be followed to control the access into an…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Assignment

    • 533 Words
    • 3 Pages

    Organizations are under increased pressure to audit every action that a user performs within a database. This is due to increased focus on security, risk, accountability and avoidance of fraud and corruption. While security prevention measures (logins, firewalls, tokens etc.) are important to prevent unauthorized access to the data in the first place, as this survey shows, most breaches occur by users who are authorized but are either negligent or malicious.…

    • 533 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Sandhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241-243.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    On 3 May 2006, a Department of Veterans Affairs (VA) laptop was stolen from a VA data analyst’s home in Montgomery County, Maryland. In addition to the laptop, a personal external hard drive was stolen. The external hard drive contained the personal data (names, social security numbers, dates of birth, disability ratings) for 26.5 million veterans and their spouses. It should be noted that the massive data theft was only one of many that had been discovered over the course of 1.5 years.…

    • 673 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Quiz: Security Program

    • 357 Words
    • 2 Pages

    | Integrity involves assuring that the users accessing the information are authorized to do so.Answer…

    • 357 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Kim, David and Solomon, Michael G., 2012, Fundamentals of Information Systems Security, CH 7.p.235 and CH10. P.335.…

    • 1574 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    True to the letter, it is an ethical and social responsibility of the US armed forces to commit in absolute compliance with existing laws on national criminal record information systems (Riley, 2005). According to available literature, US armed forces are bound by current federal laws to promptly participate in the Criminal Justice Information Systems of the FBI. Specifically, they are required to engage in disclosing relevant data on the criminal history of military members for access and use by law enforcement agencies in background checks in their efforts to identify and mitigate incidents of crime in the society (Riley,…

    • 1009 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems…

    • 833 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    References: Coronel, C., Morris, S., & Rob, P. (2011). Database systems: Design, implementation and management (9th ed.). Mason, OH: Cengage Learning.…

    • 1451 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 3 Assessment

    • 321 Words
    • 3 Pages

    your design. Next, you used the Microsoft® Active Directory Users and Computers utility to create security…

    • 321 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Apa Format Templates

    • 3280 Words
    • 14 Pages

    Bibliography U.S. Congress. House. Committee on National Security. Subcommittee on Military Personnel. POW/MIA Oversight: Hearing before the Subcommittee on Military Personnel. 105th Cong., 2nd sess., October 2, 1998.…

    • 3280 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    A good design is significant in performing data operation. Without the good design, it is difficult to make relationship with other database and it will not run competently and also securely (Knight, 2011). This report will discuss the important of good database design, which are crucial for the business in performing operation and making a decision.…

    • 1265 Words
    • 6 Pages
    Better Essays