Discussion

Instructions
You are required to post 1 thread of at least 400 words and 2 replies of  at least 200 words each. For each thread, you must support your  assertions with at least 4 citations in current APA format. Each reply  must incorporate at least 2 citations. Acceptable sources include  peer-reviewed journal articles, books, the course textbook, and the  Bible. Note that you may use the article that is included with your  assigned reading as 1 of your sources.

Thread: In the article, “Google search test shows no  progress in cyber safety: a year after breaches exposed, UKFast director  reveals that unsecure databases still likely to pose biggest cyber  threat to SME security,” database security is revealed as the most  fundamental part of creating a database, and it is vital to protecting a  company’s information assets from unauthorized access. In fact, SQL  injections have surpassed almost all other security vulnerabilities in  2013. Although security policies are often implemented to protect data,  information security remains every employee’s responsibility. Data in  the wrong hands can have a major negative impact on a business, and  security of the data ultimately falls on the creator of the database. In  this discussion board post, discuss the concept of database security as  it relates to the Bible. What mandates does God give us with respect to  protection of property? What real world examples support these biblical  truths?

Replies: Post replies to 2 different threads that either support or refute the information presented in the thread.

Reply to these two post in at least 200 words each post.
Reply #1
  Database Security         
There  are three areas of focus to database security: maintaining data  integrity, confidentiality and availability (CIA triad). “ The Defense  Information Systems Agency of the US Department of Defense (2004), in  its Database Security Technical Implementation Guide, states that  database security should provide controlled, protected access to the  contents of a database as well as preserve the integrity, consistency,  and overall quality of the data”(Murray, 2010).
Data integrity ensures the accuracy and consistency of the data. Psalm 119:1-3 says, “1Joyful are people of integrity, who follow the instructions of the Lord. 2Joyful are those who obey his laws and search for him with all their hearts. 3They  do not compromise with evil and they walk only in his paths”(NLT). Data  integrity looks at the risk of human error, virus infiltration and  hardware malfunctions. All three areas have the potential to cause a  compromise to the data. 
Today  database systems are the key data management tools and maintaining  system security is crucial.(Bertino & Sandhu, 2005). Methods to  maintain data integrity are, making sure the data is correct at the  initial gathering, utilizing data logs, ensuring data is properly backed  up, regular internal audits, limiting who has access to data and  changing permissions as needed and installing software whose function is  to detect errors. 
Proverbs  11:13 says, “A gossip goes around telling secrets, but those who are  trustworthy can keep a confidence”(NLT). To make sure data is  confidential the first line of defense is collecting only data which is  absolutely necessary. Files should be encrypted, manage who has access  to the database, and when the data is no longer needed it must be  properly disposed of. Also, the management of what devices can access  the database and that the devices are properly protected themselves.  
Philippians  2:4 says, “Don’t look out only for your own interests, but take an  interest in others too”(NLT). The data in the database needs to be  available to those who need it and when they need it. A denial of  service attack is the most common attack which affects the availability  of data. Proper installation of intrusion prevention systems. Making  sure all hardware is operating correctly and there are no software  conflicts will continue to keep the data available as well. 

Reply #2
As much as I would like to think that all  humans are good, it is simply just not the case. This is why have  certain things taught to us as kids. Things like “don’t talk to  strangers” or,  “never go with a stranger when they ask you to go  somewhere with them”. These are just some examples of little hints we  get when we know that there are just bad people out there in the world  that mean to harm others. With this idea in mind it is not different  from the fact that we also need to protect our data.
Data, just like anything that we value  in this world is something that needs to be protected. It might not  look like something so appealing to people because it might not come  across as something with physical value, but information is money and  needs to be treated as something with such value. Data is not physical  but it is owned by somebody and that means that it is property. The  Bible says things against taking someone else’s things. It is one of the  ten commandments to not steal and you know that that in of itself is a  heavy thing, especially if it is in the ten commandments. Not only is it  a sin to steal, the people who commit such acts will not inherit the  kingdom of God. 1 Corinthians 6:10 says, “Nor thieves, nor the greedy,  nor drunkards, nor revilers, nor swindlers will inherit the kingdom of  God.” Though our God is a loving God, he does not take sin lightly and  this verse is the perfect example of such anger. Now comes the question  on why people would want to take someone else’s data in the first place?  In the world we live in today it is all about data and wireless  connectivity. This includes you, there is an extension of a person that  is digital, whether that may be your bank account, your Social Security  Number, or Tax Identification Number, there is a part of you that is  digital. That is where these malicious people come into play. Once they  have access to your accounts, there is no way of telling how far they  can go. I would assume that their drive to do these things is that it is  easy money, and money does a lot of weird things to people. 1 Timothy  says, “For the love of money is a root of all kinds of evils. It is  through this craving that some have wandered away from the faith and  pierced themselves with many pangs.” This is evidence of the greed of  man, and all the reason for us to become more cautious of such acts on  our information being stolen. As long as we take precautionary measure  to keep our data to ourselves and not go into foolish endeavors online  it will greatly decrease the likelihood of this happening to us.

Custom Paper Help
Calculate your paper price
Pages (550 words)
Approximate price: -

Why Work with Us

Top Quality and Well-Researched Papers

We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.

Professional and Experienced Academic Writers

We have a team of professional writers with experience in academic and business writing. Many are native speakers and able to perform any task for which you need help.

Free Unlimited Revisions

If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account or by contacting our support.

Prompt Delivery and 100% Money-Back-Guarantee

All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.

Original & Confidential

We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text. We also promise maximum confidentiality in all of our services.

24/7 Customer Support

Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

Try it now!

Calculate the price of your order

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.

Essays

Essay Writing Service

No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system.

Admissions

Admission Essays & Business Writing Help

An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.

Reviews

Editing Support

Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.

Reviews

Revision Support

If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.