Plan Session uninvolving Introduction to Developing of a Role Based Access control security plan was to take two weeks. During the first half of the first week Jack Johnson Jersey , I shall be introduced to various training dealing with maintaining of security measures and equipping network systems with security attributes. Personal consultant during the session shall include Mrs. Dean Head of security, authentication, and authorization. The session shall be involved in developing authorization rights by specifying rights and privileges to different users of systems (V. M. Dean, personal communication June 01, 2016). Researchers shall be involved in determining measures implemented in an organization to protect unwanted authentication, and authorization of the user Second half of week shall involve setting policies for securing data and information. Facilitator during that session shall be Mr. Jack The requirement of the session shall include being trained on how to implement data and information protection measures. Researchers shall be trained on how to handle sensitive data and information within the organization (K. N. Jack Mario Lemieux Jersey , personal communication June 03, 2016). The first half of second-week session shall include assigning roles and duties depending on configuration and settings specified by organization databases. The researchers shall be trained on how to create active session required in timing time for active sessions in an organization. The session shall involve the practical implementation of authentication codes within the system (Power, Slaymaker, & Simpson, 2009). The final half of the second week shall involve the use of software based coding for systems security within the organization. Facilitator during a session shall be Miss. Betty senior systems analyst. The session shall involve training on measures applied to curb vulnerabilities within presentation layer that expose threats (T. P. Betty, personal communication June 04 Sidney Crosby Penguins Jersey , 2016). Action I took part in a session involving developing and implementing security attributes within a database session. Through the training, I was introduced on how to implement security on the client side and server side. Parameters implemented in mitigating and securing database systems from unauthorized individuals included developing and creating user accounts (V. M. Dean, personal communication June 05, 2016). I was trained on how to assign users various accounts, specifying authentication, verification and validation parameters. Various security measures implemented during session involved assigning each user with login credentials such as user password Jake Guentzel Penguins Jersey , personal identification number (PIN), and Biometric measures. Mr. Jack trained me on methods involved in securing data and information. Through session parameters such as data and information Confidentiality, Integrity, and Accessibility were implemented. The session involved setting and configuring, systems to monitor and track data and information users through recording user operations through using transaction logs. All possible user operations that can alter and modify data were recorded in database audit logs (Ni, et al. Matt Murray Penguins Jersey , 2010). The actions recorded included all aspects of creating, updating, deleting and transferring data and information (K. N. Jack, personal communication June 06, 2016). Other activities involved implementation use of code based operations in handling data and information. I was trained on how to secure data through encryption techniques. Various encryption algorithms implemented included use of hash functions, MD5 Sidney Crosby Youth Jersey , and RSA (T. P. Betty, personal communication June 08, 2016). I was also trained on setting levels and allocating various database systems user roles, responsibilities, and privileges. The rights allocated included 鈥? Database Root privileges which involve rules configured by default database systems (Crampton, & Khambhammettu Jake Guentzel Youth Jersey , 2008). 鈥? System Administrator 鈥?whose role involved managing file systems, emails, as well as software installation (Teo, et al., 2011) 鈥? Operator 鈥?managed operations such as backups and shared resources management (Li, & Tripunitara Matt Murray Youth Jersey , 2006). Observation Through session involving allocation of security measures, I observed that client side and server sided platforms require being protected from intrusion, hacking, and malware attacks. First measures towards security are ensuring that system has an orderly way of being accessed by different users (V. M. Dean, personal communication June 09, 2016). The process of enforcing security is initialized through the creation of dedicated users鈥?accounts for verifying and validating access to database information. Various accounts such as group accounts Sidney Crosby Premier Jersey , allocating user rights and privileges are major concepts that should be implemented. I observed that users can manipulate data and information through different ways (T. P. Betty, personal communication June 12, 2016). Database users are most vulnerable and easily expose data and information to intruders. An operation that involves such trends includes social engineering sharing login credentials and causing data and information leakage. I realized that there are dedicated utilities used for checking privileges such as Kerberos commands, network commands, file, and systems commands. I realized that proper dissemination of data and information Jake Guentzel Premier Jersey , as well as good practices in disposing of IT assets and files, helps in enhancing security. Use Oracle based tools such as configuring security settings using inbuilt Oracle modules stabilizes database security (V. M. Dean, personal communication June 11, 2016). Through features such as encapsulation, and creating automatic database log auditing helps in determining actions performed by various users on data. I observed that security measures were also characterized by Features such as software and hardware components that facil .