Review your classmates’ posts ( below ) and respond to at least 1 in a minimum

Review your classmates’ posts ( below ) and respond to at least 1 in a minimum of 150 words. Explain why you agree or disagree. Then, share an example from your professional experience to support your assertions.
Classmates Post – Ankion
This week’s material is short and concise, from the two materials, I have a few takeaways. First, I was able to differentiate on technicalities, relevance, and core practices for data management, particularly the capacity and functions of DBMS. Second, mechanisms or tools, of accessing information using technologies, from databases for optimal and/or increased business performance, third, the importance and significance of security, accuracy, and integrity of business data, database, and data resources. Finally, it helped me understand, and identify, the overall impact of my upcoming business, personal performance, and knowledgeability, which is invaluable and is one of the few core qualifications.
While reading this week’s material, a few details from my previous experience in minor database management, limited to accessing, and uploading accurate, and legitimate information (processed data) was lingering in my thoughts. The most interesting factor of the database management accountability was specific and limited, however, data and database management, accuracy, and security have always been the organizations I was fortunate to learn about and work hands-on with its team and support center. I posed a question to them back in 2019, re-data accuracy and integrity, as we were a team of five using the same system, with equal authority level to access database, and out of five of us, two of us have supervisor title, which comes with greater responsibility, accountability, and higher pay. The question is why we all have the same level of authority to access any information, and the system is automated, all data without aggregation is transferred and stored in the database. Their response was, that we can instantly identify the user! Oh boy! I understood data and database security, integrity, and accuracy is a governed or enforced regulations globally. The response was due to a lack of complete communication ability or understanding of the importance of data and database security. The support center provided a response based only on one factor, a database of the organization, not so much on the data, information, or communication, entrusted to the company by employees, customers, and suppliers.
The infrastructure was set up without too much focus on data security and integrity, and there are no security pre-measures. The organization does have a highly secured and aggregating hybrid network system and allows internal users or employees to access any information, including cross-departmental. I never understood the strategy of this. The question I pose is, although, there is no threat to the data and/or database security from external users. Let’s assume an employee gets terminated, and the immediate supervisor or manager missed to deactivate the employee’s user ID, assume the employee that was fired interjects malicious ware and/or inappropriate data and information – from my perspective and knowledge of data governance, an organization should limit data, database and information access to its employees within their department and within their management level.
What do you think is the best approach to address, network security threats, data, and database governance without creating time-consuming security measures, such as password, two-step-verification, and password and user id recovery methods to employees, for a hybrid network company of any size, as a measure of data and database security.
Laudon, K. C., & Laudon, J. P. (2021). Management information systems: Managing the digital firm, 17/e (17th ed.). Pearson Education.

Do you need any assistance with this question?
Send us your paper details now
We'll find the best professional writer for you!