Organizations must protect data  in a variety of ways. In Chapter 11, you read about different  methodologies on securing data in the enterprise. In Chapter 12, you  also read about the different hardware topologies that data and database  management systems reside on. Answer each of the following questions:

  • Why is security paramount to personal and enterprise computing, especially database computing?
  • Of all the types of security discussed, which form do you feel  has the MOST potential to protect data regardless of the environment  (physical environment, logical environment)? Will any of these methods  benefit blockchain computing?

TextBook attached


Leave a Reply