Cyber Studies

Páginas: 2 (348 palabras) Publicado: 22 de abril de 2012
Cyber Security Case Studies

Computer Class

* Daniela Cortes
* Julio Seaman
* Juan José Cerrato

April 24 2012

MAIN PROBLEM
A provider of online prescriptions recently experienced asecurity breach where account information was stolen out of the company’s database, including patients’ social security numbers.
POSSIBLE SOLUTIONS
1. To control the stolen information, we have tocontrol how many people have access to this database.
* For example the people in administration will not have access to certain areas of the databases including social security number. The ones makingthe prescriptions are the ones that will have limited access to the security number in the database each of them should have a number that will identify them, each time one has the need to enter thedatabase first they have to put this unique key. This way any strange movement detected by the database activity monitoring the company will know who was the employee that entered the database at thatprecise moment.
2. To use this mechanism the company will need to buy a McAfee Database Activity Monitoring which will cost 244.19$ a year. But will help in various areas such as:
*Comprehensive protection against threats: protecting databases even unpatched zero-day attack by blocking attacks that exploit known vulnerabilities and end sessions that violate security policies.
* Reportsdetailed audit trail: The audit trail reports are available to meet SOX, PCI and other compliance audit requirements. During the subsequent forensic analysis of the incidents, audit trails can helpyou determine the amount of data that has been lost and better understand the malicious activity.
* Simple patching with no downtime: apply missing patches and correct configuration errors identifiedby the analysis of vulnerabilities in McAfee Database Activity Monitoring instance improve the security of the database immediately, without requiring downtime by the virtual application technology...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • Cyber
  • Cyber
  • Cyber
  • Cyber
  • Cyber
  • Cyber
  • cyber
  • Cyber

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS