These all depend on how secure the site needs to be and how much funds are

These all depend on how secure the site needs to be

This preview shows page 1 - 3 out of 3 pages.

much funds are being directed the security implementations.Next up on the security checklist for an SQL Server is the operating system security (OS Security). This is important because even if the server is in the most secure location, if the OS is vulnerable, anyone can remote in and gather information. Making sure the system has all of the updates, patches and security implementations can prove to maximize the security of the server. Another step would be to allow administrator privileges only to those who serve a role in securing and maintaining the server. If anyone is allowed those privileges, they can change important settings which can cause huge risks and breaches.During the server installation comes a huge part in the process. Only installing components that are required for server operations is crucial to the effectiveness of the policies
Background image
enforced. Additional roles that will not serve a purpose can lead to vulnerabilities and mismanagement.
Background image
ReferencesNagy, T. (2014, February 5). SQL Server Security Checklist. Retrieved from .UpGuard. (2019, July 18). 11 Steps to Secure SQL. Retrieved from .
Background image

You've reached the end of your free preview.

Want to read all 3 pages?

  • Spring '16

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes