Capstone Papers-Creating a Security Plan
Submit a security plan to secure the organization’s database. The security plan will be submitted to the CIO. The organization has many concerns about unauthorized access, since there have been reports that some confidential information has been accessed from the database.
Specifically, the CIO would like a plan that will ensure log files can be reviewed to determine who accessed the data, when it was accessed, and what was changed in the database.
You can view the SQL Server log files. Following are the types of log files you can access using the Log File viewer.
- Audit Collection
- Data Collection
- Job History
- Maintenance Plans
- SQL Server
- SQL Server Agent
After reviewing these files, list the potential threats that could occur and propose countermeasures to overcome them. Describe the use of potential uses of cloud computing services by your organization and list the potential threats, implications, and countermeasures.