Project 5: Database Security Assessment
Step 5: Explore Database Defensive Methods

You have identified ways of protecting databases. Now, explore how these can be done on a MySQL database. Review any of the previous resources as you perform a Workspace lab. The lab will give you an opportunity to see some of the threats and risks to databases. Then, you will try some of the protective techniques and preventive measures discussed.

Complete This Lab

Resources

Getting Help

To obtain lab assistance, fill out the support request form.

Make sure you fill out the fields on the form as shown below:

  • Case Type: UMGC Virtual Labs Support
  • Customer Type: Student (Note: faculty should choose Staff/Faculty.)
  • SubType: ELM Cyber (CBR/CST/DFC/CYB)
  • SubType Detail: Pick the category that best fits the issue you are experiencing.
  • Email: Type the email that you currently use for classroom communications.

In the form's description box, provide information about the issue. Add screenshots or supporting documents, and include details such as steps you took and system responses.

Perform the lab activity.

Explore defensive methods that should be used in protecting databases.

Include information about threats, risks, and possible recommendation strategies to these threats.

Include this information in your RFP.

In the next step, you will provide a requirement statement for system structure.