Purpose
Bike Stores is a successful small chain of stores selling a wide range of cycling equipment. The company currently has stores in Texas, New York, and California. The owners are looking to expand the business to additional locations where cycling is popular. The database currently leveraged by the company tracks bike sales and inventory. It is very basic in design and limited in what it can provide for the company. For example, the database does not store customer payment, supplier transactions, or employee financial details. The owners are seeking to expand the company’s database capabilities to store these details. Download the design diagram for the current database state below.
The database capability expansion desired by the company’s owners comes with significant concerns. The current database maintains a minimal security posture since it does not contain any customer, supplier, or employee financial data. The security requirements for the database change dramatically with the inclusion of these data.
You have been tasked to develop a white paper describing the security features that need to be applied to the Bike Stores database to maintain proper protection of sensitive financial details. Research the security features of Microsoft SQL Server, which is the relational database management system (RDBMS) leveraged by the company. Describe how specific Microsoft SQL Server security features will protect sensitive Bike Stores data. Also, denote challenges or issues associated with security measure implementation. Delineate regulatory requirements that need to be satisfied by the database’s security design.
Assignment Instructions
First, navigate to the Academic Tools area of this course and select Library then Required Readings to review the Unit 4 videos covering facets associated with database security. It is very important that you watch the Unit 4 videos before completing the assignment.
Generate a 3- to 5-page white paper addressing the application of Microsoft SQL Server security features on the Bike Stores database. This page requirement only includes the body of the paper containing the researched content. The paper must adhere to APA formatting requirements, which includes one-inch margins, use of 12-point Times New Roman font, and double-spacing. A separate title page must be provided showing the paper title, course name, and student name. A separate reference page must be provided with a minimum of two reputable sources for the paper.
Assignment Requirements
The paper must comply with the following:
Rubric Title: IT3
5
0
Unit 4 Assignment Rubric
Assignment Criteria |
Level III |
Level II |
Level I |
Not Present |
|||||||
Criteria 1 |
Points: 6 |
Points: 4 |
Points: 2 |
||||||||
Criteria 1: Researched Content Amount |
Paper contains three or more full pages of researched content. |
Paper contains two full pages of researched content. |
Paper contains one full page of researched content. |
Does not meet any criteria. |
|||||||
Criteria 2 |
Points: 3 |
Points: 1 |
|||||||||
Criteria 2: Paper Title Page |
Paper has a title page with all of the following: 1. Paper title 1. Course name 1. Student name |
Paper has a title page with two of the following: 1. Paper title |
Paper has a title page with one of the following: 1. Paper title |
||||||||
Criteria 3 |
|||||||||||
Criteria 3: Paper Reference Page |
Paper has a reference page with two or more APA-formatted reputable sources. |
Paper has a reference page with one APA-formatted reputable source. |
Paper has a reference page, but sources are not APA-formatted reputable sources. |
||||||||
Criteria 4 |
Points: 15 |
Points: 12 |
Points: 9 |
||||||||
Criteria 4: Microsoft SQL Server Security Features |
Paper contains a description of four or more Microsoft SQL Server security features. |
Paper contains a description of three Microsoft SQL Server security features. |
Paper contains a description of one or two Microsoft SQL Server security features. |
||||||||
Criteria 5 |
Points: 10 |
Points: 8 |
|||||||||
Criteria 5: Security-Related Implementation Issues/Challenges |
Paper contains a description of three or more security-related implementation issues/challenges. |
Paper contains a description of two security-related implementation issues/challenges. |
Paper contains a description of one security-related implementation issue/challenge. |
||||||||
Criteria 6 |
|||||||||||
Criteria 6: Relevant Regulatory Requirements |
Paper provides a description of two or more relevant regulatory requirements that need to be satisfied by the database’s security design. |
Paper provides a description of one relevant regulatory requirement that needs to be satisfied by the database’s security design. |
Paper provides descriptions of regulatory requirements that are not relevant to the database’s security design. |
||||||||
Criteria 7 |
|||||||||||
Criteria 7: APA Requirements |
Paper fully adheres to APA requirements. |
Paper partially adheres to APA requirements with one formatting flaw. |
Paper partially adheres to APA requirements with two or more formatting flaws. |
||||||||
Maximum Total Points |
50 |
38 |
26 |
0 | |||||||
Minimum Total Points |
38.01 points minimum |
26.01 points minimum |
1 point minimum |