Nt1330 Unit 3 Assignment 1

Decent Essays
Policy-based management:
SQL server has a feature called policy-based management which is used to define and also implement policies in SQL server. It is used if we want to apply any policy against a table or database and then checks whether the database or table satisfies with the given policy. If target database objects are not satisfied with the policies then either a trigger should be fired or we can enforce it so that an administrator will come to know that there is some policy violation. It will manage one or more instances of SQL server. Policy-based management provide DBA to create a standard policies, and manage the policies, deploy them, automatically checking the policies.
1. Generally, if we want to find out the when was the last back up has happened then DBA has to make a connection to each instance manually and then check every database individually in order to find the backup dates. So this may require so much of manual work since each instances can have N number of databases may be hundreds of databases. In this
…show more content…
DBA is responsible for protecting the integrity of the data by providing the some standard rules. Policy based management used for monitoring and enforce the standard rules as a policy in SQL server.
3. DBA has to protect the configurations made in the system by the unauthorized users. If anyone changes the configuration settings then DBA will not be known that the change has happened in the configuration settings until the users complains about the problem faced because of changes made so this causes a problem. To avoid this DBA can use policy based management which can do the regular checks and make sure that database server are properly configured as we want them to be.
4. Policy based management offers another ability to DBA that it enforces the best practice standards against the databases. Apart from able to create a custom policies we can also use the SQL Server best practice policies which will come default when

Related Documents

  • Improved Essays

    1. As per my knowledge, students can --> contact the Student Help Desk by phone at 610.372.4721 ext. 5171, or by email at helpdesk@racc.edu and they will get help, or --> go to this website https://myracc.racc.edu/cas/login?service=https:%2F%2Fmyracc.racc.edu%2Fc%2Fportal%2Flogin and upon clicking on "Forgot Password", they should enter their username and click "OK". To reset the password, they should enter their username.…

    • 410 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Techfite Ethics Case Study

    • 1205 Words
    • 5 Pages

    TASK 1: ETHICAL STANDARDS A. Create three corporate policies that reflect the organization's culture and ethical viewpoints. TechFite is a British company that has recently opened its first U.S. factory. The organization is struggling with budgetary constraints in its newest region despite seemingly earning well and rewarding its executives with handsome bonuses. The company has faltered on its commitments to Dellberg and its community, made at the time of establishing itself in the U.S. and citizens are taking note.…

    • 1205 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    The company that I choose was PNC bank. I think that the database that would be most beneficial would be a transactional database. A transactional database is a database management system (DBMS) that has the ability to roll back or undo a database transaction or operation if it is not completed appropriately.…

    • 208 Words
    • 1 Pages
    Decent Essays
  • Improved Essays
    • 484 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Most business DBMSs offer a method to dealing with privileges that makes use of SQL referred as Discretionary Access Control (DAC). The SQL supports DAC by GRANT and REVOKE commands. The GRANT command gives privileges to users, and the REVOKE command takes away privileges. Discretionary access control, though effective, has some weaknesses. Especially, an unauthorized user can trick an authorized user into disclosing sensitive information.…

    • 1989 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    1. Discuss the purpose of an Information Security Policy and how it fits into an effective information security architecture. Your discussion should include the different levels of policies and what should be covered in an information security policy. A security policy should fulfill a multitude of purposes which a few are: Protecting people, information and setting the rules for behavior by all company personnel. Authorizing security personnel to monitor, probe and investigate.…

    • 761 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    In order to understand the differences between a security policy and an acceptable use policy we must understand the how each one is define in our textbook. “Security policy consist of statement ranking information risks, identifying acceptable security goals, and identifying the mechanism for achieving these goals. Acceptable use police, defines the acceptable uses of the firm’s information resources and computing equipment, including desktop and laptop computer, wireless devices, telephones, and the Internet” (Laudon & Laudon, 2016, p. 323). A security policy stablishes rules and behaviors for users and administrators within an organization. It is a living document which continuously updates as technology and employee requirements change.…

    • 231 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    APO01 Manage the IT Management Framework The practice of this criterion helps in achieving the alignment of IT and business strategy, IT agility, Resource Optimisation, Increased IT Personnel Productivity and IT compliance with internal policies and external regulations. This criterion also ensures that an effective set of policies is defined, maintained and communicated to every stakeholder associated with the enterprise (ISACA, 2012b, p.51). APO01.01 Define the organisational structure. This criterion of COBIT 5 Process Reference Model recommends having clearly defined management structures like committees to enable effective and efficient management decision making (ISACA, 2012b, p.52).…

    • 220 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    IT Internal Control System

    • 1001 Words
    • 5 Pages

    According to Turner and Weickgenannt (2013), there three major control concerns related to databases, and such as: Unauthorized access, adequate backup of the data, and data integrity. To prevent a data breach and exposing sensitive information, the company should develop an automated security system through IT compliance control. It can be done by implementing log-in procedures, password settings in every certain days, server and firewall configurations, biometric controls, security token, intrusion detection in all company’s computers, and vulnerability assessment (Turner & Weickgenannt, 2013). When there is an immediate business transaction occurs, the company should able to identify any external threats by using real-time alert system, if there is a system used by the company. Real-time alert system can help to identify and respond to the threat of a targeted attack and security and sensitive information, and it will a red flag to the management to investigate any suspicious network activities.…

    • 1001 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Speedy Carrier Essay

    • 863 Words
    • 4 Pages

    • The Reliability of the information. • The information will be available 24/7. • Performing the Risk management assessments to identify and evaluate the risks. • Apply the ethics and legal of the country…

    • 863 Words
    • 4 Pages
    Decent Essays
  • Superior Essays

    Overview of goals and objectives: According to Iowa state university, Information assurance is the method of maintaining and managing the risks regarding some information. Information assurance professionals try to protect the information and information systems by assuring authentication, confidentiality, integrity and availability of information. At whatever the phase the information is like storage, transition or processing, ensuring the protection of the information is the key. We can also say that assuring the authorized users to have access to the authorized information at the right time.…

    • 1819 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Volkswagen Failure Essay

    • 773 Words
    • 4 Pages

    Corporate Failure Analysis of Volkswagen This article will analyze the Volkswagen case in the viewpoint of corporate governance. As the scandal came up to the scene, Volkswagen defrauded in emission tests and make the improper cars pass from the tests in the “normal mode” rather than the “best case” scenario which also is not suitable for US emission standards. As a result, 11million cars were recalled, VW lost 20 billion dollars and especially 80 years of good reputation of the brand is suddenly collapsed. 1 This reputational loss is a big issue on which means the cost of excluding from the industry and be the one who doesn’t want to be traded with. This requires some down actions to the company like decreasing the prices,…

    • 773 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    I am making this maintenance plan for Preston valley, Dallas. Maintenance is defined as the work that is done to keep your building in good working condition. This is done on a regular basis. Most of the maintenance tasks are done by the building’s super, but some of the tasks can be done by officers, maintenance and repairs committee, outside contractors or the tenants themselves.…

    • 966 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Case 5.3 Iphone Mini

    • 1081 Words
    • 5 Pages

    5.3.3 Inventory Policy In this case, inventory policy constitutes of a standard set of rules and guidelines that offer a company with a framework of achieving more timely and well-founded decisions regarding the stock to purchase or manufacture, the place to distribute to the product customers and the price that the stock will cost (Olsson, 2014). The inventory policy that we have adopted will strengthen our position in purchasing stock as we have established the volume sales for each stock to assist in buying the appropriate amount. In addition, we will establish the stock that has to be maintained at all times to ensure that supply will always be sufficient.…

    • 1081 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    The demand for agility and speed continues to grow. Leasing management automation answers that demand with qualitative functionality that covers all essential leasing and administrative tasks. Standard and customized modern software solutions for real estate investors and property managers are user friendly, compatible with diverse digital devices and platforms, and industry focused. Regardless of the size of an operation, it is imperative to choose software solutions developed according to best practices for property management companies.…

    • 1038 Words
    • 4 Pages
    Great Essays