Page 260 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 260
Wireless Networks
Notes for exceptions, the security administrator must also decide what privileges must be explicitly
granted to individual users.
Using Roles for End-User Privilege Management
Roles are the easiest way to grant and manage the common privileges needed by different groups
of database users.
Consider a situation where every user in the accounting department of a company needs the
privileges to run the accounts receivable and accounts payable database applications (ACCTS_
REC and ACCTS_PAY). Roles are associated with both applications, and they contain the object
privileges necessary to execute those applications.
The following actions, performed by the database or security administrator, address this simple
security situation:
z z Create a role named accountant.
z z Grant the roles for the ACCTS_REC and ACCTS_PAY database applications to
the accountant role.
z z Grant each user of the accounting department the accountant role.
Self-Assessment
Fill in the blanks:
16. Proper ……………............… aging policies will naturally take care of old or unused
accounts.
17. ……………............… is extremely popular, and it provides an extremely effective and
secure method by which users can be centrally authenticated, complete with a method to
support changing passwords on expired accounts.
18. ……………............… security includes the mechanisms that control the access to and use of
the database at the object level.
Case Study 2FA helps a US based Mortgage Servicing Company in
Meeting their Compliance Requirements
ustomer is an end-to-end provider of loss mitigation and portfolio management
services for mortgage lenders, servicers, asset managers and investors. Customer
Cbased out of USA provides a single-source solution for reducing costs and
mitigating loss at every stage of the mortgage process.
Business Challenge
Due to the specialist nature of their work, customer’s employees are frequently required
to work from any of the firm’s offices as well as at client premises, which means needing
to have flexible and secure access to data at all times. Customer have invested heavily
in providing the necessary IT infrastructure to support this critical business requirement
and are continually reviewing their corporate network to ensure that the system keeps
pace with the evolving needs of the business and developments in technology as well
as ensuring it meets the latest security compliance standards required to protect client
information. Customer complies with various Data Security Accreditions like ISO 27001,
PCI DSS Level1, SAS 70 TypeII and HIPAA. The customer has identified the need for a
Contd...
254 LOVELY PROFESSIONAL UNIVERSITY