home *** CD-ROM | disk | FTP | other *** search
/ New Perspectives on Computer Concepts / New Perspectives on Computer Concepts.iso / np2010c / page724.pag < prev    next >
Portable Network Graphic  |  2008-10-02  |  126KB  |  817x1045  |  8-bit (256 colors)
Labels: crt screen | hakham | laptop | monitor | plant | reckoner | sky
OCR: 656 SECTION CHAPTER 11 How can policies help to secure databases? A notebook com- puter an easy target. Most thieves are after the hardware but they might hit the jackpot fa computer contains corporate or government database. To minimize vulnerabilities caused by employee inattention organizations can formulate database use policies such as requiring employees to log off the system before going to lunch and prohibiting employees from removing sensitive data from the workplace A poob set of policies decreases the risk of unauthorized access within the workplace, minimizes the chance con- fidential data escaping from the workplace and helps improve data entry accuracy What can monitoring accomplish?A database audit is procedure that monitors and records user activity within database r some i ...