Skip to Main Content
Securing SQL Server, 3rd Edition
book

Securing SQL Server, 3rd Edition

by Denny Cherry
April 2015
Intermediate to advanced content levelIntermediate to advanced
462 pages
13h 59m
English
Syngress
Content preview from Securing SQL Server, 3rd Edition
Chapter 1

Identifying Security Requirements

Abstract

This chapter talks about how to figure how what security objectives need to be identified.

Keywords

security
objectives

Information in this chapter

What are security objectives?
When should security objectives been identified?
How to identify security objectives?

What are Security Objectives?

There are two kinds of security objectives that need to be dealt with. The first is the easiest, identify the data which must be protected and why it must be protected. This includes data such as personally identifiable information (PII) such as names, email addresses, usernames, passwords, date of birth, etc. The second is a little more complex as it requires identifying any potential ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Securing SQL Server: DBAs Defending the Database

Securing SQL Server: DBAs Defending the Database

Peter A. Carter
SQL Server 2019 Administration Inside Out

SQL Server 2019 Administration Inside Out

Randolph West, Melody Zacharias, William Assaf, Sven Aelterman, Louis Davidson, Joseph D’Antoni

Publisher Resources

ISBN: 9780128012758