Defend your choice of topic in 500 words or more. Explain why you chose it. Include at least 3 quotes from different sources in quotation marks and cited in-line. I have listed the following final project topics and choose a unique topic among them.
- Database security compliance with anti-money laundering statutes
- Risks of overly privileged users
- Auditing v. monitoring
- Maintaining data integrity with hash functions
- Security risks in database migration
- Quantitative risk assessment methodologies
- Qualitative risk assessment methodologies
- Reducing costs with tiered storage
- Physical protections for your database
- IOT threats to database security
- TDE
- Tokenization
- Global data Integrity violation examples
- Efficient disaster recovery
- How to effect litigation holds
- Data as evidence: what is chain of custody?
- Data as evidence: The Federal Rules of Civil Procedure
- GDPR Compliance
- HIPAA Compliance
- SOX Compliance
- Database STIGs
- ISO Database Security Framework
- NIST Database Security Framework
- Patch management and the medical device
- Strict Liability v. Ordinary Negligence for the DBA
- How Oracle 12c advances the security discussion
- How Stuxnet exposed the exceptional importance of data integrity
- Are Data integrity violations worse than confidentiality breaches?
- How the tsunami of data expansion increases security concerns
- Mobile users and data security
- Why is vulnerability assessment critical for data security?
- Legitimate privilege abuse ad how to prevent it
- Monitoring your most highly privileged users – what the regulations say.
- Creating a database security culture
- Vulnerable storage media?
- Patching – To automate or not?
- What do you have – inventorying your legacy data.
- The human factor – how to keep your DBA up-to-date
- Monitoring database use patterns to detect anomalies
- Quantitative v. Qualitative security risk assessment