New England College Database Creating a Database Security Culture Research Paper The final project consists of three parts: 1. a twelve minute powerpoint

New England College Database Creating a Database Security Culture Research Paper The final project consists of three parts:

1. a twelve minute powerpoint presentation with at least 12 slides not including a reference list. If you use images, you must provide proper attribution. Be focused and provide something your peers will find useful not what we could find on a Wikipedia page.

Don't use plagiarized sources. Get Your Custom Essay on
New England College Database Creating a Database Security Culture Research Paper The final project consists of three parts: 1. a twelve minute powerpoint
Get an essay WRITTEN FOR YOU, Plagiarism free, and by an EXPERT!
Order Essay

2. An annotated reference list of at least five references. Annotations are notes. In this case write two paragraphs about each source. The first is a summary of what the source informs and the second is why it is valuable.

(Your references should be academically appropriate not from commercial sources and preferably from articles you found on the Reference Databases availalbe through the Danforth Library Each annotation consists of two paragraphs. The first paragraph summarizes the source and the second paragraph is your reflection (thoughts) on the source. A paragraph for this purpose consists of a topic sentence and at least four more sentences (total 5).)

3. A one page single spaced summary (1000 words) of what you learned in this project. it should be written in essay format with no bullet or numbered lists. It must include quotes from your sources which must be surrounded by quotation marks and cited in-line. It must have an informative title which should not be too broad but should focus attention on your topic.

I have attached the project proposal document. Running head: CREATING DATABASE SECURITY CULTURE
Creating Database Security Culture
Student’s Name
Institution
Course
Professor
Date
1
CREATING DATABASE SECURITY CULTURE
2
Creating a Database Security Culture
Digital threats not only affect organizational systems but also human weakness too.
Implementing cultures that support organization goals in terms of security is vital. Creating a
database security culture that support strong implementation of security measure to vital and
confidential organizational data and information is imperative. Since culture is not something that
grows automatically, it requires care and feeding. A sustainable security culture is more than a
single event. A sustainable organization’s culture can transform from a single security event to a
security lifecycle within an organization. There are strategies that can be implemented to create a
sustainable database security culture. Therefore, it is important for my peers to understand the
topic “Creating a database security culture” within an organization.
A database security culture supports minimization of threats to information and data
resources by creating a suitable information security beliefs and practices. Sustainable database
security culture control the behavior of employees when dealing with data and information systems
thus evading risks that may lead to risks related to data and DBMS as well. “Focusing on the
technical aspects of security, without appropriate consideration of the human interaction with the
system is evidently inadequate”, (Hogail, 2015, P.163).Thus, it can be concluded that an effective
database security culture encourages human conduct through values, artifacts, assumptions and
knowledge.
“It is crucial to understand the perceptions, attitudes and behavior of the organization’s
employees in order to shape the information security culture into one in which the nature,
confidentiality and sensitivity of information are understood, and information is handled
accordingly”, (Da Veiga & Martins, 2015, p.3). Identifying factors that have positive impact on
database security culture adoption is worthwhile. Understanding the tactics that can be used to
CREATING DATABASE SECURITY CULTURE
3
create a sustainable database security culture within an organization is crucial. Creating awareness
amongst employees is one of the common techniques in creating a sustainable security culture.
However, being aware of security threats is not enough, it is half-way the journey. Employees need
to know what actions they ought to take. Teaching employees on how to deal with database
security threats and risks is an important tactic in creating a sustainable database security culture.
Many firms have the assumption that information security department is answerable for
security. However, this is not the case because a justifiable security culture involves everyone
within the organization. Therefore, reinforcing the ideology that it is the responsibility of every
employee within the organization to uphold behavior that support systems and data security
ensures creation of a sustainable database security culture. All database users are responsible for
upholding data security practices while handling data. “Information security culture will also
emerge from encouraging acceptable information security behavior”, (Safa, Sookhak, Von Solms,
Furnell, Ghani, & Herawan, 2015).
Database security culture can be understood as a set of information security features such
as integrity and availability of information. Also, it can be perceived as to what is right and wrong
in relation to information security. Facilitating a strong culture on database security can be
achieved through benchmarking. An organization is able to compare itself with similar
organizations and decide which behavioral practices should be adopted, thereby ensuring, creating
and adoption of successful database security culture. Therefore, benchmarking is a strategy that is
helpful in embracing an acceptable database security culture.
CREATING DATABASE SECURITY CULTURE
4
References
Da Veiga, A., & Martins, N. (2015). undefined. Computers & Security, 49, 162-176.
Hogail, A. A. (2015). Cultivating and assessing an organizational information security culture;
an empirical study. International Journal of Security and Its Applications, 9(7), 163-178.
Safa, N. S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N. A., & Herawan, T. (2015).
undefined. Computers & Security, 53, 65-78.

Purchase answer to see full
attachment

Calculate your paper price
Pages (550 words)
Approximate price: -

Why Choose Us

Top quality papers

We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.

Professional academic writers

We have hired a team of professional writers experienced in academic and business writing. Most of them are native speakers and PhD holders able to take care of any assignment you need help with.

Free revisions

If you feel that we missed something, send the order for a free revision. You will have 10 days to send the order for revision after you receive the final paper. You can either do it on your own after signing in to your personal account or by contacting our support.

On-time delivery

All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.

Original & confidential

We use several checkers to make sure that all papers you receive are plagiarism-free. Our editors carefully go through all in-text citations. We also promise full confidentiality in all our services.

24/7 Customer Support

Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

Try it now!

Calculate the price of your order

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.

Essays

Essay Writing Service

You are welcome to choose your academic level and the type of your paper. Our academic experts will gladly help you with essays, case studies, research papers and other assignments.

Admissions

Admission help & business writing

You can be positive that we will be here 24/7 to help you get accepted to the Master’s program at the TOP-universities or help you get a well-paid position.

Reviews

Editing your paper

Our academic writers and editors will help you submit a well-structured and organized paper just on time. We will ensure that your final paper is of the highest quality and absolutely free of mistakes.

Reviews

Revising your paper

Our academic writers and editors will help you with unlimited number of revisions in case you need any customization of your academic papers