Your corporation has invested heavily in a complex MySQL database. Discuss at least four different ways in which you can defend against a catastrophic loss of this important corporate asset. For each approach, suggest how MySQL utilities can be used to implement your approach.
MySQL Database Security
Student’s First Name, Middle Initial(s), Last Name
Course Number and Name
Instructor’s Name and Title
Assignment Due Date
MySQL Database Security
MySQL Database is commonly used by many administrators and developers for being quick and easy to use. The functionalities of fast processes and ease of use in the databases increase the vulnerabilities and weaknesses of attacks by hackers. There are different ways to increase the defense of the MySQL database which include the removal of an anonymous user, set up strong passwords, enforce the principle of least privilege, and enabling the TLS within the MySQL database.
Anonymous accounts have some partial access to the MySQL database system and can use that access to gain passwords from the members with setting up usernames and passwords. Anonymous accounts involve the MySQL database which does not have a username or and a password. The security measures should be to completely restrict access for these anonymous accounts that they don’t get any access whatsoever. It involves a command that identifies the anonymous users who record blank username, deletes, and blocks them from accessing the database.
Secondly, the MySQL database can be defended by requiring all Database users to use strong passwords. Any malicious person can use the password manager to a random password for the database account. Therefore, it is important to improve the security protocols of the database that offers additional MySQL access control to limit particular accounts from logging multiple times. Thirdly, the security protocols should enforce the principle of least privilege which implements that an account can only be granted access when it needs to perform a specific job. The principle instructs the command of granting permission to allow the user to access the parts of the databases which are needed by the user. Lastly, the enabling of the TLS defends the database over the network. The TLS secures the database from all vulnerabilities that may exist on the network traffic. The restriction must also require clients to use the TLS when connecting. These four ways are important in the defense of the MySQL database.
Ma, Y. (2017, May). The Research on MySQL Security Baseline. In 2nd International Conference on Mechatronics Engineering and Information Technology (ICMEIT 2017). Atlantis Press.