You were hired as a database security expert to train the database administration team. At the first training session, you ask the trainees to perform the following tasks using Oracle Enterprise Manager or SQL*Plus. Describe what you expect your trainees

computer science

Description

Case 3-1 Training Case You were hired as a database security expert to train the database administration team. At the first training session, you ask the trainees to perform the following tasks using Oracle Enterprise Manager or SQL*Plus. Describe what you expect your trainees to produce. •Create a user named CH0306 with the password CH0306. •Modify the user options using SQL*Plus to change the default table space and temporary table space to TOOLS and TEMP respectively. •Lock the account. •Using SQL*Plus change the user password to DBSEC. (Optional) •View the account using the data dictionary.(You can provide a screenshot) •View user quotas using the data dictionary. At the second training session, you ask the students to outline a list of the best three practices of user administration. List what you expect your students to produce. Case 3-1 Training Case (Modified) You were hired as a database security expert to train the database administration team. At the first training session, you ask the trainees to perform the following tasks using Microsoft SQL Server Management Studio. Describe what you expect your trainees to produce. (You can use the following help) •Create a login named CH0306 with the password CH0306. •Create a database user of the same name for the login created above. •Change the user password to DBSEC. (Optional) •View the account using the data dictionary. (You can provide a screenshot) At the second training session, you ask the students to outline a list of the best three practices of user administration. List what you expect your students to produce. Discussion Question-2 (Week 3,4.) Please describe DAC (Discretionary Access Control), MAC (Mandatory Access Control), and RBAC (Role-Based Access Control) ? Give an example of each in use.


Related Questions in computer science category


Disclaimer
The ready solutions purchased from Library are already used solutions. Please do not submit them directly as it may lead to plagiarism. Once paid, the solution file download link will be sent to your provided email. Please either use them for learning purpose or re-write them in your own language. In case if you haven't get the email, do let us know via chat support.