glass
pen
clip
papers
heaphones

Defend your choice of topic in 500 words or more. Explain why you chose it. Include at…

Defend your choice of topic in 500 words or more. Explain why you chose it. Include at…

Defend your choice of topic in 500 words or more. Explain why you chose it. Include at least 3 quotes from different sources in quotation marks and cited in-line. I have listed the following final project topics and choose a unique topic among them.  Database security compliance with  anti-money laundering statutes Risks of overly privileged users Auditing v. monitoring Maintaining data integrity with hash functions Security risks in database migration Quantitative risk assessment methodologies Qualitative risk assessment methodologies Reducing costs with tiered storage Physical protections for your database  IOT threats to database security  TDE  Tokenization  Global data Integrity violation examples  Efficient disaster recovery  How to effect litigation holds  Data as evidence: what is chain of custody?  Data as evidence: The Federal Rules of Civil Procedure  GDPR Compliance  HIPAA Compliance  SOX Compliance   Database STIGs  ISO Database Security Framework  NIST Database Security Framework  Patch management and the medical device  Strict Liability v. Ordinary Negligence for the DBA  How Oracle 12c advances the security discussion  How Stuxnet exposed the exceptional importance of data integrity  Are Data integrity violations worse than confidentiality breaches?  How the tsunami of data expansion increases security concerns  Mobile users and data security  Why is vulnerability assessment critical for data security?  Legitimate privilege abuse ad how to prevent it  Monitoring your most highly privileged users – what the regulations say.  Creating a database security culture  Vulnerable storage media?  Patching – To automate or not?  What do you have – inventorying your legacy data.  The human factor – how to keep your DBA up-to-date  Monitoring database use patterns to detect anomalies  Quantitative v. Qualitative security risk assessment