Documentos de Académico
Documentos de Profesional
Documentos de Cultura
In our readings we have learned the importance of encryption of sensitive data across database
environments. We must consider data at rest and data transmission. Encryption allows securing
both production and backup copies of databases. The successful use of encryption depends upon
two main features: the strength of the encryption algorithm and the security of the decryption
key or process.
As you contemplate encryption and its use in securing databases, it is worthy to note the
statement made in your textbook:
Encryption provides protection of sensitive data for an unprotected medium. The sensitive data
and transmission has to cross unprotected media. We must consider the access to sensitive data
from users who access databases at the operating system and storage tiers.
You are required to complete BOTH Part A and Part B of the assignment.
Part A
Please write short essay answers discussing the following questions and submit in a word
document:
1. Give an example of why data encryption is needed and when you would use encryption.
2. Name three examples of data elements that would require data encryption (per
regulations such as HIPAA).
3. Compare and discuss the pros and cons between the use of hashing and the use of
encryption.
4. Discuss encryption key management techniques. What are some of the considerations and
issues? Give at least two examples of key management techniques.
You have been assigned the task of writing a script for creating database users. The script will
perform the following tasks and conform to the following specifications:
1. Create the following two (2) users with their respective passwords. Please use the exact
spelling. (15 points)
4. The user has to change his/her password the first time when he/she log in the database.
7. At the end of the creation, list the user information that shows a successful creation of the
above user account.
Tips:
a. You need system privilege to create new user. An easy way is to log in as SYSTEM before
running the script. Or, you may use "CONNECT system" or "CONNECT system/&password."
Upon running your script, you will enter the password. The password is what you entered in your
installation or oracle if you are using the prebuilt image.
b. You will write the script in Notepad or WordPad. In order to test it again and again, it is a good
idea to add one statement of dropping the user at the beginning of the script. The drop statement
will be like "DROP USER dbsec CASCADE."
c. A database dictionary view "dba_users" can be used to find user information. There are, of
course, other ways to do it, which are acceptable as well.
d. Please note that the password specification is case sensitive even though Oracle SQL
statement in general is not case sensitive.
Phase 2: Modify User and Create Tables
This part of the lab requires you to use all previous knowledge to create database objects and
populate data into tables. It will prepare you for database objects to practice various database
security techniques in this course.
You need to create one (the only one) SQL script that will complete the following tasks:
1. Connect to SYSTEM user. When you need to connect to SYSTEM users, please use a
syntax so that it will ask the user to type the password. A typical example will be:
"connect system;"
2. Change the password of the user "DBSEC" to "secc$1new." Please note that the period
"." is not a part of the password specification.
3. Grant the DBSEC user with "CREATE SESSION" and "CREATE TABLE" privileges.
4. Connect to DBSEC with the new password.
5. Create the following 5 tables under DBSEC schema.
JOB
JOB_ID
JOB_TITLE
Note use JOB_ID as the primary key
EMPLOYEE
EMPLOYEE_ID
EMPLOYEE_NAME
Note use EMPLOYEE_ID as the primary key
CUSTOMER
CUSTOMER_ID
CUSTOMER_NAME
Note use CUSTOMER_ID as the primary key
SUPPLIER
SUPPLIER_ID,
SUPPLIER_NAME
Note use SUPPLIER_ID as the primary key
Tip:
To be able to repeatedly test your script, you may add "DROP TABLE table-name;" at the
beginning of your file to drop all tables.
Submission Requirement:
For each Phase 1 and 2 you will be required to submit the following:
The SQL script files will be required and the screen capture of the lab completed steps.
Grading Rubric