New England College Database Creating a Database Security Culture Research Paper The final project consists of three parts: 1. a twelve minute powerpoint

New England College Database Creating a Database Security Culture Research Paper The final project consists of three parts:

1. a twelve minute powerpoint presentation with at least 12 slides not including a reference list. If you use images, you must provide proper attribution. Be focused and provide something your peers will find useful not what we could find on a Wikipedia page.

Don't use plagiarized sources. Get Your Custom Essay on
New England College Database Creating a Database Security Culture Research Paper The final project consists of three parts: 1. a twelve minute powerpoint
Get an essay WRITTEN FOR YOU, Plagiarism free, and by an EXPERT!
Order Essay

2. An annotated reference list of at least five references. Annotations are notes. In this case write two paragraphs about each source. The first is a summary of what the source informs and the second is why it is valuable.

(Your references should be academically appropriate not from commercial sources and preferably from articles you found on the Reference Databases availalbe through the Danforth Library Each annotation consists of two paragraphs. The first paragraph summarizes the source and the second paragraph is your reflection (thoughts) on the source. A paragraph for this purpose consists of a topic sentence and at least four more sentences (total 5).)

3. A one page single spaced summary (1000 words) of what you learned in this project. it should be written in essay format with no bullet or numbered lists. It must include quotes from your sources which must be surrounded by quotation marks and cited in-line. It must have an informative title which should not be too broad but should focus attention on your topic.

I have attached the project proposal document. Running head: CREATING DATABASE SECURITY CULTURE
Creating Database Security Culture
Student’s Name
Institution
Course
Professor
Date
1
CREATING DATABASE SECURITY CULTURE
2
Creating a Database Security Culture
Digital threats not only affect organizational systems but also human weakness too.
Implementing cultures that support organization goals in terms of security is vital. Creating a
database security culture that support strong implementation of security measure to vital and
confidential organizational data and information is imperative. Since culture is not something that
grows automatically, it requires care and feeding. A sustainable security culture is more than a
single event. A sustainable organization’s culture can transform from a single security event to a
security lifecycle within an organization. There are strategies that can be implemented to create a
sustainable database security culture. Therefore, it is important for my peers to understand the
topic “Creating a database security culture” within an organization.
A database security culture supports minimization of threats to information and data
resources by creating a suitable information security beliefs and practices. Sustainable database
security culture control the behavior of employees when dealing with data and information systems
thus evading risks that may lead to risks related to data and DBMS as well. “Focusing on the
technical aspects of security, without appropriate consideration of the human interaction with the
system is evidently inadequate”, (Hogail, 2015, P.163).Thus, it can be concluded that an effective
database security culture encourages human conduct through values, artifacts, assumptions and
knowledge.
“It is crucial to understand the perceptions, attitudes and behavior of the organization’s
employees in order to shape the information security culture into one in which the nature,
confidentiality and sensitivity of information are understood, and information is handled
accordingly”, (Da Veiga & Martins, 2015, p.3). Identifying factors that have positive impact on
database security culture adoption is worthwhile. Understanding the tactics that can be used to
CREATING DATABASE SECURITY CULTURE
3
create a sustainable database security culture within an organization is crucial. Creating awareness
amongst employees is one of the common techniques in creating a sustainable security culture.
However, being aware of security threats is not enough, it is half-way the journey. Employees need
to know what actions they ought to take. Teaching employees on how to deal with database
security threats and risks is an important tactic in creating a sustainable database security culture.
Many firms have the assumption that information security department is answerable for
security. However, this is not the case because a justifiable security culture involves everyone
within the organization. Therefore, reinforcing the ideology that it is the responsibility of every
employee within the organization to uphold behavior that support systems and data security
ensures creation of a sustainable database security culture. All database users are responsible for
upholding data security practices while handling data. “Information security culture will also
emerge from encouraging acceptable information security behavior”, (Safa, Sookhak, Von Solms,
Furnell, Ghani, & Herawan, 2015).
Database security culture can be understood as a set of information security features such
as integrity and availability of information. Also, it can be perceived as to what is right and wrong
in relation to information security. Facilitating a strong culture on database security can be
achieved through benchmarking. An organization is able to compare itself with similar
organizations and decide which behavioral practices should be adopted, thereby ensuring, creating
and adoption of successful database security culture. Therefore, benchmarking is a strategy that is
helpful in embracing an acceptable database security culture.
CREATING DATABASE SECURITY CULTURE
4
References
Da Veiga, A., & Martins, N. (2015). undefined. Computers & Security, 49, 162-176.
Hogail, A. A. (2015). Cultivating and assessing an organizational information security culture;
an empirical study. International Journal of Security and Its Applications, 9(7), 163-178.
Safa, N. S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N. A., & Herawan, T. (2015).
undefined. Computers & Security, 53, 65-78.

Purchase answer to see full
attachment

superadmin

Recent Posts

LDR 3302-21.01.01-1A24-S1, Organizational Theory and Behavior

LDR 3302-21.01.01-1A24-S1, Organizational Theory and Behavior Unit III Essay Top of Form Bottom of Form…

3 years ago

Psychology Question | My Essay Helpers

Chapter 9 What are teratogens? Give 5 examples. Define each of these stages: Germinal, embryonic,…

3 years ago

Financial Market Analysis | My Essay Helpers

You are a Financial Analyst that has been appointed to lead a team in the…

3 years ago

Decision theory | My Essay Helpers

This week’s discussion will focus on management decision-making and control in two companies, American corporation…

3 years ago

Literature Question | My Essay Helpers

Mary Rowlandson felt that the man who eventually came to own her, Quinnapin, was “the…

3 years ago