09 Jun Instructions You are required to post 1 thread of at least 400 words and 2 replies of ?at least 200 w
Instructions
You are required to post 1 thread of at least 400 words and 2 replies of at least 200 words each. For each thread, you must support your assertions with at least 4 citations in current APA format. Each reply must incorporate at least 2 citations. Acceptable sources include peer-reviewed journal articles, books, the course textbook, and the Bible. Note that you may use the article that is included with your assigned reading as 1 of your sources.
Thread: In the article, “Google search test shows no progress in cyber safety: a year after breaches exposed, UKFast director reveals that unsecure databases still likely to pose biggest cyber threat to SME security,” database security is revealed as the most fundamental part of creating a database, and it is vital to protecting a company’s information assets from unauthorized access. In fact, SQL injections have surpassed almost all other security vulnerabilities in 2013. Although security policies are often implemented to protect data, information security remains every employee’s responsibility. Data in the wrong hands can have a major negative impact on a business, and security of the data ultimately falls on the creator of the database. In this discussion board post, discuss the concept of database security as it relates to the Bible. What mandates does God give us with respect to protection of property? What real world examples support these biblical truths?
Replies: Post replies to 2 different threads that either support or refute the information presented in the thread.
Reply to these two post in at least 200 words each post.
Reply #1
Database Security
There are three areas of focus to database security: maintaining data integrity, confidentiality and availability (CIA triad). “ The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical Implementation Guide, states that database security should provide controlled, protected access to the contents of a database as well as preserve the integrity, consistency, and overall quality of the data”(Murray, 2010).
Data integrity ensures the accuracy and consistency of the data. Psalm 119:1-3 says, “1Joyful are people of integrity, who follow the instructions of the Lord. 2Joyful are those who obey his laws and search for him with all their hearts. 3They do not compromise with evil and they walk only in his paths”(NLT). Data integrity looks at the risk of human error, virus infiltration and hardware malfunctions. All three areas have the potential to cause a compromise to the data.
Today database systems are the key data management tools and maintaining system security is crucial.(Bertino & Sandhu, 2005). Methods to maintain data integrity are, making sure the data is correct at the initial gathering, utilizing data logs, ensuring data is properly backed up, regular internal audits, limiting who has access to data and changing permissions as needed and installing software whose function is to detect errors.
Proverbs 11:13 says, “A gossip goes around telling secrets, but those who are trustworthy can keep a confidence”(NLT). To make sure data is confidential the first line of defense is collecting only data which is absolutely necessary. Files should be encrypted, manage who has access to the database, and when the data is no longer needed it must be properly disposed of. Also, the management of what devices can access the database and that the devices are properly protected themselves.
Philippians 2:4 says, “Don’t look out only for your own interests, but take an interest in others too”(NLT). The data in the database needs to be available to those who need it and when they need it. A denial of service attack is the most common attack which affects the availability of data. Proper installation of intrusion prevention systems. Making sure all hardware is operating correctly and there are no software conflicts will continue to keep the data available as well.
Reply #2
As much as I would like to think that all humans are good, it is simply just not the case. This is why have certain things taught to us as kids. Things like “don’t talk to strangers” or, “never go with a stranger when they ask you to go somewhere with them”. These are just some examples of little hints we get when we know that there are just bad people out there in the world that mean to harm others. With this idea in mind it is not different from the fact that we also need to protect our data.
Data, just like anything that we value in this world is something that needs to be protected. It might not look like something so appealing to people because it might not come across as something with physical value, but information is money and needs to be treated as something with such value. Data is not physical but it is owned by somebody and that means that it is property. The Bible says things against taking someone else’s things. It is one of the ten commandments to not steal and you know that that in of itself is a heavy thing, especially if it is in the ten commandments. Not only is it a sin to steal, the people who commit such acts will not inherit the kingdom of God. 1 Corinthians 6:10 says, “Nor thieves, nor the greedy, nor drunkards, nor revilers, nor swindlers will inherit the kingdom of God.” Though our God is a loving God, he does not take sin lightly and this verse is the perfect example of such anger. Now comes the question on why people would want to take someone else’s data in the first place? In the world we live in today it is all about data and wireless connectivity. This includes you, there is an extension of a person that is digital, whether that may be your bank account, your Social Security Number, or Tax Identification Number, there is a part of you that is digital. That is where these malicious people come into play. Once they have access to your accounts, there is no way of telling how far they can go. I would assume that their drive to do these things is that it is easy money, and money does a lot of weird things to people. 1 Timothy says, “For the love of money is a root of all kinds of evils. It is through this craving that some have wandered away from the faith and pierced themselves with many pangs.” This is evidence of the greed of man, and all the reason for us to become more cautious of such acts on our information being stolen. As long as we take precautionary measure to keep our data to ourselves and not go into foolish endeavors online it will greatly decrease the likelihood of this happening to us.