Page 260 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 260

Wireless Networks




                    Notes          for exceptions, the security administrator must also decide what privileges must be explicitly
                                   granted to individual users.
                                   Using Roles for End-User Privilege Management
                                   Roles are the easiest way to grant and manage the common privileges needed by different groups
                                   of database users.

                                   Consider a situation where every user in the accounting department of a company needs the
                                   privileges to run the accounts receivable and accounts payable database applications (ACCTS_
                                   REC and ACCTS_PAY). Roles are associated with both applications, and they contain the object
                                   privileges necessary to execute those applications.
                                   The following actions, performed by the database or security administrator, address this simple
                                   security situation:
                                   z z  Create a role named accountant.

                                   z z  Grant the roles for the  ACCTS_REC  and  ACCTS_PAY  database applications to
                                       the accountant role.
                                   z z  Grant each user of the accounting department the accountant role.

                                   Self-Assessment

                                   Fill in the blanks:
                                   16.   Proper ……………............… aging policies will naturally take care of old or unused
                                       accounts.
                                   17.   ……………............…  is  extremely  popular,  and  it  provides  an  extremely  effective  and
                                       secure method by which users can be centrally authenticated, complete with a method to
                                       support changing passwords on expired accounts.
                                   18.   ……………............… security includes the mechanisms that control the access to and use of
                                       the database at the object level.

                                       

                                     Case Study   2FA helps a US based Mortgage Servicing Company in
                                              Meeting their Compliance Requirements

                                           ustomer is an end-to-end provider of loss mitigation and portfolio management
                                           services for mortgage lenders, servicers, asset managers and investors. Customer
                                     Cbased out of USA provides a single-source solution for reducing costs and
                                     mitigating loss at every stage of the mortgage process.
                                     Business Challenge
                                     Due to the specialist nature of their work, customer’s employees are frequently required
                                     to  work from any of the firm’s offices as well as at client premises, which means needing
                                     to have flexible and secure access to data at all times. Customer have invested heavily
                                     in providing the necessary IT infrastructure to support this critical business requirement
                                     and are continually reviewing their corporate network to ensure that the system keeps
                                     pace with the evolving  needs of the business and developments in technology as well
                                     as ensuring  it meets the  latest  security  compliance  standards required  to protect  client
                                     information. Customer complies with  various Data Security Accreditions like ISO 27001,
                                     PCI DSS Level1, SAS 70 TypeII and HIPAA. The customer has identified the need for a
                                                                                                         Contd...



          254                              LOVELY PROFESSIONAL UNIVERSITY
   255   256   257   258   259   260   261   262   263   264   265