logo

Database Security

McGraw-Hill Education book on Security Oracle Database 12c: A Technical Primer

5 Pages685 Words20 Views
   

Added on  2022-12-20

About This Document

This article discusses the importance of database security and disaster recovery plans. It explains the role of data recovery options and the techniques used in the industry, such as clustering and replication.

Database Security

McGraw-Hill Education book on Security Oracle Database 12c: A Technical Primer

   Added on 2022-12-20

ShareRelated Documents
Running head: DATABASE SECURITY
DATABASE SECURITY
Name of the Student:
Name of the University:
Author Name:
Database Security_1
DATABASE SECURITY
1
The disaster recovery plan is a previously planned and decided strategy that is to be
implemented when the company or the organisation is facing critical data loss or system
failure situations. Each and every employee of the company must be aware of the data
recovery plans that are in place in case of any emergency. The data recovery options are
usually handled by specialised teams that are trained for this very moment. In my place of
employment the data recovery is handled by the operations team and few members of the
information security and the server maintenance teams. These people who are involved in
handling this critical situation are highly trained in the disaster recovery method that needs to
be implemented. There are multiple disaster recovery plans out there that can be used to
contain such situations or recover from such places. The most common techniques include
clustering, mirroring, replication, group’s availability and log shipping. The most common
data recovery techniques use a combination of these methods or an individual method.
In my company, the two methods that are used to recover from such situations are
clustering and replication. In the clustering technique the number of systems or servers are
increased and more than the required numbers are used. This is so because if by chance a
single server or system fails or the data is breached, the other unaffected systems or servers
can take the existing load without causing an interruption in the services. This is used mainly
because the industry that I am employed in is an online website based service industry and
also deals in large amount of critical data files that needs to be backed up on a regular basis.
This type of industries require multiple servers and plenty of bandwidth to maintain the
uptime of its websites even during critical system crashes or data breaches or hacker attacks.
This extra unused servers and mainframe machines are only used when such emergencies
occur. Due to the nature of the business any downtime in the website can potentially lead to
loss in revenue for the company I work in. The physical storage drives and machines are used
Database Security_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment Disaster Recovery Plan
|7
|1810
|527

Business Continuity Planning Methodology
|4
|590
|111

Disaster Recovery Training for Business: Importance, Methods, and Support
|7
|1277
|177

ATA Backup Disaster Recovery Data
|7
|1179
|143

Virtualisation and Cloud Computing PDF
|9
|1856
|161

IT Management
|7
|797
|401