Chat with us, powered by LiveChat Instructions You are required to post 1 thread of at least 400 words and 2 replies of ?at least 200 w - EssayAbode

Instructions You are required to post 1 thread of at least 400 words and 2 replies of ?at least 200 w

Instructions

You are required to post 1 thread of at least 400 words and 2 replies of  at least 200 words each. For each thread, you must support your  assertions with at least 4 citations in current APA format. Each reply  must incorporate at least 2 citations. Acceptable sources include  peer-reviewed journal articles, books, the course textbook, and the  Bible. Note that you may use the article that is included with your  assigned reading as 1 of your sources.

Thread: In the article, “Google search test shows no  progress in cyber safety: a year after breaches exposed, UKFast director  reveals that unsecure databases still likely to pose biggest cyber  threat to SME security,” database security is revealed as the most  fundamental part of creating a database, and it is vital to protecting a  company’s information assets from unauthorized access. In fact, SQL  injections have surpassed almost all other security vulnerabilities in  2013. Although security policies are often implemented to protect data,  information security remains every employee’s responsibility. Data in  the wrong hands can have a major negative impact on a business, and  security of the data ultimately falls on the creator of the database. In  this discussion board post, discuss the concept of database security as  it relates to the Bible. What mandates does God give us with respect to  protection of property? What real world examples support these biblical  truths?

Replies: Post replies to 2 different threads that either support or refute the information presented in the thread.

Reply to these two post in at least 200 words each post.

Reply #1

  Database Security         

There  are three areas of focus to database security: maintaining data  integrity, confidentiality and availability (CIA triad). “ The Defense  Information Systems Agency of the US Department of Defense (2004), in  its Database Security Technical Implementation Guide, states that  database security should provide controlled, protected access to the  contents of a database as well as preserve the integrity, consistency,  and overall quality of the data”(Murray, 2010).

Data integrity ensures the accuracy and consistency of the data. Psalm 119:1-3 says, “1Joyful are people of integrity, who follow the instructions of the Lord. 2Joyful are those who obey his laws and search for him with all their hearts. 3They  do not compromise with evil and they walk only in his paths”(NLT). Data  integrity looks at the risk of human error, virus infiltration and  hardware malfunctions. All three areas have the potential to cause a  compromise to the data. 

Today  database systems are the key data management tools and maintaining  system security is crucial.(Bertino & Sandhu, 2005). Methods to  maintain data integrity are, making sure the data is correct at the  initial gathering, utilizing data logs, ensuring data is properly backed  up, regular internal audits, limiting who has access to data and  changing permissions as needed and installing software whose function is  to detect errors. 

Proverbs  11:13 says, “A gossip goes around telling secrets, but those who are  trustworthy can keep a confidence”(NLT). To make sure data is  confidential the first line of defense is collecting only data which is  absolutely necessary. Files should be encrypted, manage who has access  to the database, and when the data is no longer needed it must be  properly disposed of. Also, the management of what devices can access  the database and that the devices are properly protected themselves.  

Philippians  2:4 says, “Don’t look out only for your own interests, but take an  interest in others too”(NLT). The data in the database needs to be  available to those who need it and when they need it. A denial of  service attack is the most common attack which affects the availability  of data. Proper installation of intrusion prevention systems. Making  sure all hardware is operating correctly and there are no software  conflicts will continue to keep the data available as well. 

Reply #2

As much as I would like to think that all  humans are good, it is simply just not the case. This is why have  certain things taught to us as kids. Things like “don’t talk to  strangers” or,  “never go with a stranger when they ask you to go  somewhere with them”. These are just some examples of little hints we  get when we know that there are just bad people out there in the world  that mean to harm others. With this idea in mind it is not different  from the fact that we also need to protect our data.

Data, just like anything that we value  in this world is something that needs to be protected. It might not  look like something so appealing to people because it might not come  across as something with physical value, but information is money and  needs to be treated as something with such value. Data is not physical  but it is owned by somebody and that means that it is property. The  Bible says things against taking someone else’s things. It is one of the  ten commandments to not steal and you know that that in of itself is a  heavy thing, especially if it is in the ten commandments. Not only is it  a sin to steal, the people who commit such acts will not inherit the  kingdom of God. 1 Corinthians 6:10 says, “Nor thieves, nor the greedy,  nor drunkards, nor revilers, nor swindlers will inherit the kingdom of  God.” Though our God is a loving God, he does not take sin lightly and  this verse is the perfect example of such anger. Now comes the question  on why people would want to take someone else’s data in the first place?  In the world we live in today it is all about data and wireless  connectivity. This includes you, there is an extension of a person that  is digital, whether that may be your bank account, your Social Security  Number, or Tax Identification Number, there is a part of you that is  digital. That is where these malicious people come into play. Once they  have access to your accounts, there is no way of telling how far they  can go. I would assume that their drive to do these things is that it is  easy money, and money does a lot of weird things to people. 1 Timothy  says, “For the love of money is a root of all kinds of evils. It is  through this craving that some have wandered away from the faith and  pierced themselves with many pangs.” This is evidence of the greed of  man, and all the reason for us to become more cautious of such acts on  our information being stolen. As long as we take precautionary measure  to keep our data to ourselves and not go into foolish endeavors online  it will greatly decrease the likelihood of this happening to us.

Related Tags

Academic APA Assignment Business Capstone College Conclusion Course Day Discussion Double Spaced Essay English Finance General Graduate History Information Justify Literature Management Market Masters Math Minimum MLA Nursing Organizational Outline Pages Paper Presentation Questions Questionnaire Reference Response Response School Subject Slides Sources Student Support Times New Roman Title Topics Word Write Writing