This website uses cookies to ensure you have the best experience. Learn more

The Deployment Of Security Policy In Information Systems

1024 words - 5 pages

research methodology
Quantitative and qualitative approaches have been used in this research, which have carried out different performance characteristics of database auditing.
iv case study
Taxation chamber is governmental organization in Sudan, which responsible of gathering taxes.

practical work
The results of implementing database auditing tools yield most variations in the revelation of suspicious activities; therefore, the researcher has tested three database auditing tools (AUDIT_TRAIL, LOGMINER, FLASHBACK).
In this respect, the results demonstrate the security efficiency for each tool, moreover, the three database auditing tools which have been provided by Oracle enterprise they have been tested in the light of suspicious activities detection.
In this work, the researcher explains and clarifies the realistic implementation of database auditing tools, while table (11) illustrate the properties of the three auditing tools in detecting the suspicious activities or crimes. Hence it has been noticed that database auditing tools (AUDIT_TRAIL, LOGMINER, FLASHBACK) vary technically as well.
Tool Security feature Recovery feature Database performance
Audit_trail High None Low
Logminer High High Medium
Flashback Medium High Low

Table 1: Database Auditing Tools Features

Database AUDIT_TRAIL and LOGMINER tools significantly remain at a high level in detecting suspicious activities rather than flashback tool.
The different experiments in the above mentioned tools yield a variation in Greenwich Mean Time (GMT) time stamp precision. In this respect, the experiments have proven that LOGMINER tool better in time stamp accuracy as it has been shown in table (12) below:

Tool Time Stamp Precision
Audit_trail High
Logminer Very High
Flashback Medium

Table 2: Time Stamp Accuracy

It has been noticed in this research, mechanisms which have beenactually introduced by Oracle enterprise (AUDIT_TRAIL, LOGMINER, FLASHBACK) respect to recovery and security, however, part of these tools have been for recovery and auditing purposes.
Database auditing tools affect performances, hence, it has been noticed that significant conduction of these tools are due to the different experiment as well. The research worker has proceeded in the laboratory and compared this tool with other database security once thus; it has been show below in figure (17) below:

Figure 1 : security tool compare with auditing tool
In this work, the researcher proposes different alternative solutions to curb the SYSDBA security hole and SQL injection problem.
On the other hand, the researcher provides technique solutions for SQL injection and this way it has been done through getting around the character set problem via decreasing the user inputs and handling errors.
7.2 The Test of Research Hypothesis:
The researcher has tested the research hypothesis through the calculation of the standard error formula as it has been stated below in Table 1.3 case processing...

Find Another Essay On The Deployment of Security Policy in Information Systems

Heart-Healthy Insurance Information Security Policy Essay

753 words - 4 pages Current Policy Statements 1. New User Policy “New users are assigned access based on the content of an access request. The submitter must sign the request and indicate which systems the new user will need access to and what level of access will be needed. A manager’s approval is required to grant administrator level access.” 2. Password Requirements “Passwords must be at least eight characters long and contain a combination of upper- and

An analysis of strategic role of information systems, specific social, ethical and legal issues, IT infrastructure and emerging technologies, and information systems security within FedEx Corporation

5469 words - 22 pages . Fourth, this report has also analysed three business processes in FedEx that are particularly vulnerable to IT security failures with some examples.Based on the analysis of whole report, recommendations are outlined as follows:•Always keep an eye on various ethical, social and legal issues when implementing and using information systems. At the same time, use legal weapon to protect the company's intellectual property.•Pay attention to

My paper discusses how applied information management systems have a variety of risks and the different types of security you can get

2007 words - 8 pages censored for public policy reasons, such as not publishing defense initiatives to prevent the information from falling into enemy hands" (64). Businesses need to be careful about what they publish because if it is not censored, another business could steal their idea. On the other hand, "private information - what's posted by a person - can't be subject to censorship because of freedom of expression" (64). Living in the United States, we have the

Exploring a Grounded Theory Study on Information Security Policy Compliance

2258 words - 10 pages information systems research. European Journal of Economics, Finance and Administrative Sciences, 15, 32-50. Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly, 34(3), 487-502. Stanton, J.M., Stam, K.R., Mastrangelo, P., & Jolton, J. (2004). Analysis of end user security behaviors. Computers and Security, 24(2), 1-10. Urquhart, C., Lehmann, H., & Myers, M.D. (2010). Putting the ‘theory’ back into grounded theory: Guidelines for grounded theory studies in information systems. Information Systems Journal, 20(4), 357-381.

The Role of Security Policy

1089 words - 4 pages company or organization can use for policies and standards. Security Policy Companies and organizations use security policies to protect information. A security policy is a document that informs a company how to protect the physical and information technology (Rouse, 2007). The security policy document would be constantly updated with any changes in the company's information. A company with multiple systems that contain different

The Role of "White Hat" Hackers in Information Security

2076 words - 9 pages massive problems, and that your current staff, while competent in basic administrative issues, cannot handle the world of information security. You are advised that the most important thing you need is a comprehensive security policy. You will be offered either a rewrite of an existing policy or an entirely new policy. The fee will be enormous, and it will be obvious that the only people qualified to develop your new policy are the ones that did the

The role of information systems in Supply Chain Management

1710 words - 7 pages The role of information systems in Supply Chain ManagementIntroductionThe purpose of this essay is to explore and evaluate the various approaches that can be taken to facilitate the management of supply chains.Supply Chain Management - A terminological backgroundThe Institute for Supply Chain Management has defined supply management as "the identification, acquisition, access, positioning and management of resources an organisation needs or

The Use of Geographic Information Systems in Real Estate Appraisal

5038 words - 20 pages The Use of Geographic Information Systems in Real Estate Appraisal Abstract Appraisers need to show the reasoning behind their value opinions by discussing important spatial relationships and their likely effect on value. Geographic information systems (GIS) can be used to analyze these relationships and to show why a client should select an appraiser who has this level of information. Gilbert Castle has noted that real estate is

The Effects of Deployment in the Modern Military

2587 words - 11 pages there are not enough healthcare providers. Helping the soldier recover from war has now become a bigger issue than helping the soldier's family. Soldiers returning from combat have issues that may include post-traumatic stress disorder (PTSD) and physical disabilities. Being deployed also exposes the soldiers to various diseases not common in the United States. Once the soldier returns from a deployment, they are given three months of training

Management of Information Systems in an Organization

884 words - 4 pages Management of Information Systems in an Organization INTRODUCTION Management Information Systems are distinct from regular information systems in that they are used to analyze other information systems applied in operational activities in the organization.(1) In a recent survey article in The Economist, John Browning (1990) wrote: "Information technology is no longer a business resource; it is the business environment." His statement is not

The Development of Strategic Information Systems Theory

10152 words - 41 pages The Development of Strategic Information Systems Theory During the last 15 years, an area has developed within the Information Systems discipline which is generally referred to as 'strategic information systems'. It concerns itself with systems whose importance to the organisation extend beyond merely assisting it to perform its existing functions efficiently, or even just effectively. A strategic information system is instrumental in

Similar Essays

The Deployment Of Security Policy In Information Systems

1556 words - 7 pages against at least one template and incase of a match, each of the matched native audits is reduced (A method for eliminating audit trail , 2006). A security management and audit program database provided in which information security policy and object system correspond to management and audit programs (Kayashima et al., 2001). REFERENCES [1] Snene M., “Knowledge patterns of distributed information systems- the case of distribution design and

The Role Of Information Security Policy

941 words - 4 pages Implementation of policies and standards within an organization are important to maintain information systems security. Employees within an organization play a huge role in the effort to create, execute, and enforce a security policy. Every business requires a different strategy and approach to it's security policy, depending on their size and nature of business. Security Policies An organization's security policy describes the company's

Security Management Models For Information Systems

1014 words - 4 pages Background Security management within the context of information systems “needs a paradigm shift in order to successfully protect information assets” (Eloff & Eloff, 2003). Due the rapid increase in information security threats, security management measures have been taken to proactively remedy the growing threat facing information security. As a result of this, security management “is becoming more complex everyday, many organization’s

Biometrics Introduction To Information Systems Security

622 words - 2 pages gathering information on people's travel patterns.Biometric devices and applications have been growing worldwide. They are expected to be the way for accessing personal computer systems. According to research it is expected that biometric expenditure will reach $300 million in 2008. Biometrics works on the principle that everyone in the world is different. A variety of factors are taken into consideration when implementing a biometric system. Each