1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NeX [460]
3 years ago
6

You work for a company that is growing. Originally, all the users in all departments had access to all the data in the database.

It is considered a security risk. What is an appropriate action to reduce the risk?
Computers and Technology
2 answers:
elena-s [515]3 years ago
7 0

Answer:

Authorization levels (privileges) need to be set for the users in the company.

Explanation:

Users need to be classified according to their departments and their position. Each group should see only <em>related</em> data, so their authorizations need to be done accordingly.

Also managers and staff should have different levels of reach to the data. Thus their privileges should set accordingly.

NeX [460]3 years ago
7 0

Answer:

Restrict access privileges on a "<em>need to know"</em> basis.

Explanation:

Every user on the company should have assigned one or more roles based on their work location, activities and/or department.

Then data on the database must have the access permissions restricted to the corresponding roles.

For example a "sales" role might have read and write access to the <em>clients </em>data, but only read access to <em>products </em>data.

You might be interested in
Refer to the exhibit. An administrator is examining the message in a syslog server. What can be determined from the message? Thi
ad-work [718]

Answer:

This is a notification message for a normal but significant condition

Explanation:

Syslog represents the standard for logging message, it sends messages through UDP port 514. Familiar syslog facilities includes IP, OSPF protocols, etc. The messages from syslog are both about facility and level.

A syslog server is a means through which network devices sends messages about events into a logging server which is called syslog server. Since a syslog protocol supports so many devices, it can also be used to log a good number of events.

8 0
3 years ago
Read 2 more answers
I have no idea, this has two parts. Any help I would love.
lana [24]

Answer:

2that is the question??? then many I could help

7 0
3 years ago
All of the following are benefits of automation except
Tasya [4]

Question 1:

4. it increases the number of employees

Question 2:

2. false

Question 3:

2. it causes great damage to the ozone layer

Question 4:

1. true



6 0
3 years ago
The internet has provided great opportunities for fundraising. true/false
alekssr [168]
True, sites such as kickstarter and just giving are fantastic examples of such.
8 0
3 years ago
A company's loss control department identifies theft as a recurring loss type over the past year. Based on the department's repo
maria [59]

Answer: C) Motion detectors

Explanation:

Motion detectors is the device that is used for detection of moving object in any area. They are used for security purposes by tracking motion or people and alerting the user.It consist of motion sensor for detection of motion and alerting the users or organization about security breach through alarming .

  • According to the question,Chief information officer should implement motion detectors to investigate about theft that takes place in company's department on regular basis.Any intervention for company's loss will be alerted through tracking motion of the thief.
  • Other options are incorrect because camera is used for recording videos and images. Bio-metric device is used for digital identification of any person to enter into a system. Man-trap is vestibule used for controlling access of a person for security.
  • Thus, the correct option is option(C).
6 0
3 years ago
Other questions:
  • The columns of a spreadsheet data source are A. form letters. B. the mailing list. C. data points. D. fields.
    12·1 answer
  • Analytical processing uses multi-levelaggregates, instead of record level access.? True? False
    12·1 answer
  • All of the following are forms of verbal communication except
    12·2 answers
  • Explain how each of the five types of prewriting assist a writer in getting started. please make it short.
    15·1 answer
  • Which of the following is NOT a strength of monetary policy?
    15·1 answer
  • NEED ANSWER ASAP. CORRECT ANSWER GETS BRAINLIEST! TY
    5·1 answer
  • Stages of reverse engineering
    8·1 answer
  • Which avenue may utilize video streaming, audio narration, print designs and animation?
    7·1 answer
  • Which of the following is a database concept that allows for storage and analysis for a dozen to billions of data points?
    7·1 answer
  • The owner creator of a folder/file object has complete access to the object even when no user or group is assigned any access to
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!