Page 441 - Using MIS
P. 441

Q7  How Can Human Safeguards Protect Against Security Threats?   409
                            Q6         How Can Data Safeguards Protect Against

                                       Security Threats?


                                       Data safeguards protect databases and other organizational data. Two organizational units are
                                       responsible for data safeguards. Data administration refers to an organization-wide function
                                       that is in charge of developing data policies and enforcing data standards.
                                           Database administration refers to a function that pertains to a particular database. ERP,
                                       CRM, and MRP databases each have a database administration function. Database adminis-
                                       tration develops procedures and practices to ensure efficient and orderly multiuser process-
                                       ing of the database, to control changes to the database structure, and to protect the database.
                                       Database administration was summarized in Chapter 5.
                                           Both data and database administration are involved in establishing the data safeguards in
                                       Figure 10-13. First, data administration should define data policies such as “We will not share
                                       identifying customer data with any other organization” and the like. Then data administration and
                                       database administration(s) work together to specify user data rights and responsibilities. Third,
                                       those rights should be enforced by user accounts that are authenticated at least by passwords.
                                           The organization should protect sensitive data by storing it in encrypted form. Such en-
                                       cryption uses one or more keys in ways similar to that described for data communication en-
                                       cryption. One potential problem with stored data, however, is that the key might be lost or that
                                       disgruntled or terminated employees might destroy it. Because of this possibility, when data are
                                       encrypted, a trusted party should have a copy of the encryption key. This safety procedure is
                                       sometimes called key escrow.
                                           Another data safeguard is to periodically create backup copies of database contents. The
                                       organization should store at least some of these backups off premises, possibly in a remote loca-
                                       tion. Additionally, IT personnel should periodically practice recovery to ensure that the backups
                                       are valid and that effective recovery procedures exist. Do not assume that just because a backup
                                       is made that the database is protected.
                                           Physical security is another data safeguard. The computers that run the DBMS and all de-
                                       vices that store database data should reside in locked, controlled-access facilities. If not, they
                                       are subject not only to theft, but also to damage. For better security, the organization should
                                       keep a log showing who entered the facility, when, and for what purpose.
                                           When organizations store databases in the cloud, all of the safeguards in Figure 10-13
                                       should be part of the cloud service contract.



                            Q7         How Can Human Safeguards Protect Against

                                       Security Threats?


                                       Human safeguards involve the people and procedure components of information systems. In
                                       general, human safeguards result when authorized users follow appropriate procedures for sys-
                                       tem use and recovery. Restricting access to authorized users requires effective authentication




                                                                 •  Define data policies
                                                                 •  Data rights and responsibilities
                                                                 •  Rights enforced by user accounts
                                                                    authenticated by passwords
                                                                 •  Data encryption
            Figure 10-13                                         •  Backup and recovery procedures
            Data Safeguards                                      •  Physical security
   436   437   438   439   440   441   442   443   444   445   446