Every piece of data that is important enough for an organization to collect and maintain is important enough to be secured and protected properly. This means that only those people within the organization who have a business requirement to access the data should be permitted to access it. All other access should be denied using the security mechanisms of the DBMS and/or add-on security software. Failure to adequately protect data is why we see so many stories about data breaches (over 150 in the past 18 months).
Dig Deeper on Data stewardship
Related Q&A from Craig S. Mullins
Our expert suggests that the best way to pass the SAP BW exam is to have hands-on job experience. But that's not all he has to say about ... Continue Reading
To export data from a DB2 table to a flat file, you need to run an export specifying the proper file format. The export utility exports data from a ... Continue Reading
Craig Mullins recommends two specific resources for learning how to create and support Binary Large Objects (BLOB) in DB2. Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.