Open Access. Powered by Scholars. Published by Universities.®
- Publication
- Publication Type
Articles 1 - 2 of 2
Full-Text Articles in Business
The Chain-Link Fence Model: A Framework For Creating Security Procedures, Robert F. Houghton
The Chain-Link Fence Model: A Framework For Creating Security Procedures, Robert F. Houghton
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
Information technology security professionals are facing an ever growing threat to the networks that they defend. The process for creating procedures to help stem this threat is very difficult for security professionals. The Chain-Link Fence Model helps security professionals by guiding them through the process of creating and implementing new security procedures.
Database Security: What Students Need To Know, Meg C. Murray
Database Security: What Students Need To Know, Meg C. Murray
Faculty Articles
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical Implementation Guide, states that database security should provide controlled, protected access to the contents of a database as well as preserve the integrity, consistency, and overall quality of the data. Students in the computing disciplines must develop an …