• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 12. Implementing Security > Assessing the Security Risk

Assessing the Security Risk

In the same way that you need to gather specifications and plan the design of a database system, you need to assess security risks and develop a security plan before cooking up a security implementation. It's always easier to build security into a database system as it's being built than it is to add security features to a complete system, so if you're constructing a new database system, security considerations need to be factored in at the database design stage, not later on.

A security risk assessment can be performed on an existing database system right away, but if a new system is being created from scratch, you need to design the database structure before conducting the security assessment. Without the database structure, you have no way of knowing the scope of the security issues.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint