Question 1
I find that the answer that has been given is substantive and enough to define what is to be looked into. The most important security concerns that companies experience today are the management of assets like data and the general security of the information systems that are there in place today. This paper will discuss the strategies and the features that need to be taken into consideration in the design of the database for the new enterprise that has been described. It is true that there is need to have access control. There is need to have access controls that will not only protect the data from internal and external attackers but also from errors that users will make. An example of an error is that of a user deleting an important database object like a table assuming that they are not that important. The answer that has been given can be said to be original and well structured.
Question 2
The second answer serves well for the online database. There is need to ensure that they meet the requirements of data transmission. Another important security features that should be considered is encryption. It is a strong security measure if its implementation is taken seriously. While it is true that it is strong, it is not a magical solution that will solve all the security issues of an organization (Wang, Du, & Lehmann, 2010). It is also true that no security strategy would be deemed to be complete without the use of encryption. In our case, there will be the need to have data encryption for the data at rest as they are the data that is found in the database. The organization will have to consider encrypting the data that is at rests in the database. The answer is original but not exhaustive.
Question 3
The answer to this question is that of separation of environments. There is need to ensure that this is achieved. Another issue that will need to be considered is that of separation of environments. The best information security practice has been that of separating of production, test, QA or similar environments. This practice has been integrated in many audit programs for a long time and it has been effective (Coronel, Morris, & Rob, 2009).
References
Wang, T., Du, H., & Lehmann, C. (2010). Accounting for the benefits of database normalization. American Journal of Business Education , 3 (1), 41-52.
Coronel, C., Morris, S., & Rob, P. (2009). Database systems: Design, implementation, and management. New York: Cengage Learning.