Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2021, International Journal of Innovation in Computer Science and Information Technology
Data has been, is, and will be an important part of our lives. Today, with the advancement of technology, the amount of data produced and its importance has increased so that a wrong data stream can lead to catastrophic and even irreparable problems. These errors can be made by information thieves and hackers, intentionally, to corrupt or misuse data. In this age when data is a very sensitive commodity, attacking and destroying or losing, or even disclosing it can cause irreparable damage, and in sensitive cases such as military and political data, it can lead to the failure and even overthrow of governments. With regard to such cases, the need for data protection and security and related solutions are raised, such as data encryption and monitoring and control of data access.
1993
This chapter discusses the topic of data security and controls, primarily in the context of Database Management Systems DBMSs. The emphasis is on basic principles and mechanisms, which have been successfully used by practitioners in actual products and systems. Where appropriate, the limitations of these techniques are also noted. Our discussion focuses on principles and general concepts. It is therefore independent of any particular product except for section 7 which discusses some products.
https://www.researchgate.net/, 2015
The history of database research backs to more than thirty years, in which created the concept of the relational database system that has become the most fundamental change for organizations strategy. Technology evolution has produced more powerful systems that relate to economic impacts in the recent decade. Organizations must ensure its information and data be secured and confidential. Therefore, they deploy systems or applications have functions, services, and tools for data maintenance and management packed into the so-called Relational Database Management System (RDBMS). Database protection means disallowing illegitimate users to access the database and its sensitive information whether intentional or accidental [4]. Therefore, most of the Such functions contain services plus privileges for authorization to keep firms are taking account of possibility of threats as measures to their database systems. This paper addresses the relational database threats and security techniques considerations in relation to situations: threats, countermeasures (computer-based controls) and database security methods [1,8, 9].
UHD Journal of Science and Technology
Currently, data production is as quick as possible; however, databases are collections of well-organized data that can be accessed, maintained, and updated quickly. Database systems are critical to your company because they convey data about sales transactions, product inventories, customer profiles, and marketing activities. To accomplish data manipulation and maintenance activities the Database Management System considered. Databases differ because their conclusions based on countless rules about what an invulnerable database constitutes. As a result, database protection seekers encounter difficulties in terms of a fantastic figure selection to maintain their database security. The main goal of this study is to identify the risk and how we can secure databases, encrypt sensitive data, modify system databases, and update database systems, as well as to evaluate some of the methods to handle these problems in security databases. However, because information plays such an important r...
When creating a database, it makes sense to accept the defaults of unlimited file growth in 10% increments. This is especially crucial to the transaction log, as changes cannot be made to the data of a database with a full transaction log. A maintenance plan can be set up to periodically shrink files. Transaction log files are initially created by default to be 25% of the size of the data files. This default should be accepted unless the database data will have an unusually low number of changes, in which case a smaller transaction log file would be appropriate. This paper provides a comprehensive review onsecurity towards sql server database.
2014
A database-management system (DBMS) is a collection of correlated data and a set of programs to access correlated data. The collection of data, usually referred to as the database, contains information able to an enterprise. And hence the concept of security lies with-in. As the database contains all information relevant to particular enterprise, so it's very important to be in safe side to prevent all threats related to data. Various Security Mechanisms have been developed to prevent ill-legal and un-authorized access of data (enterprise related, web or network related etc.) by un-authorized users and hackers. Database security is a growing concern of the market these days as there has been found an un-expected growth in ill-legal access of data. This paper is the brief analysis of all the threats and attacks against database security and integrity. Database security is the mechanisms that secure the database from data tampering, deliberate threats, unauthorized users and hackers. Security refers to protecting data from unauthorized users and Integrity refers to protecting the data against authorized users. Both concepts must be taken into consideration for making a complete check on overall security of database.
Data security is an emerging concern proved by an increase in the number of reported cases of loss of or exposure to sensitive data by some unauthorized sources. Security is a composed part in which it protects and secures the sensitive data or database management software from some unauthorized user or from malicious attacks. In this paper we will be presenting some of the common security techniques for the data that can be implemented in fortifying and strengthening the databases.
In today's world, data is generated at a very rapid speed and final destination of such data is database. Data is stored in database for easy and efficient way to manage these data. All the operations of data manipulation and maintenance are done using Database Management System. Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. A secure database is the one which is reciprocated from different possible database attacks. Security models are required to develop for databases. These models are different in many aspects as they are dealing with different issues of the database security. They may different also because of they are taking different assumptions about what constitutes a secure database. So, it becomes very difficult for database security seekers to select appropriate model for securing their database. In this paper, we have discussed some of the attacks that can be possible with its counter measures and its control methods that can be possible. Securing database is important approach for the planning of explicit and directive based database security requirements. Ensuring security for database is very critical issues for the companies. As complexity of database increases, we may tend to have more complex security issues of database.
Information and Software Technology, 1994
Database security plays an important role in the overall security of information systems and networks. This is both because of the nature of this technology and its widespread use today. The development of appropriate secure database design and implementation methodologies is therefore an important research problem and a necessary prerequisite for the successful development of such systems. The general framework and requirements for database security are given and a number of parameters of the secure database design and implementation problem are presented and discussed in this paper. A secure database system development methodology is then presented which could help overcome some of the problems currently encountered.
2014
In this paper, we describe the different database architecture and security measures. The architecture of a database system is greatly influenced by the underlying computer system on which the database system runs. Database systems can be centralized, where one server machine executes operations on the database. Database systems can also be designed to exploit parallel computer architectures. Distributed databases span multiple geographically separated machines. Ensuring the security of databases is also a complex issue when discussing database architecture. The purpose of this paper is to highlight and identify the architectures of database systems running on server systems, which are used in centralized and client–server architectures and the security measures pertaining to database systems.
Database security is a growing concern as the amount of sensitive data collected and retained in databases is fast growing and most of these data are being made accessible via the internet. Majority of the companies, organizations and teaching and learning institutions store sensitive data in databases .As most of these data are electronically accessed , It can therefore be assumed that , the integrity of these numerous and sensitive data is prone to different kind of threat such as{Unauthorized access, theft as well access denial}. Therefore, the need for securing databases has also increased The primary objectives of database security are to prevent unauthorized access to data, prevent unauthorized tampering or modification of data, and to also ensure that, these data remains available whenever needed. In this paper, we developed a database security framework by combining different security mechanism on a sensitive students information database application designed for Shehu Shagari College of Education Sokoto (SSCOE) with the aim of minimizing and preventing the data from Confidentiality, Integrity and Availability threats.
International Journal of Management, Technology, and Social Sciences (IJMTS), 2019
Information is the core and most vital asset these days. The subject which deals with Information is called Information Science. Information Science is responsible for different information related affairs from collection, selection, organization, processing, management and dissemination of information and contents. And for this information related purpose Information Technology plays a leading role. Information Technology has different components viz. Database Technology, Web Technology, Networking Technology, Multimedia Technology and traditional Software Technology. All these technologies are responsible for creating and advancing society. Database Technology is concerned with the Database. It is worthy to note that, Database is concerned with the repository of related data in a container or base. The data, in Database normally stored in different forms and Database Technology play a lead role for dealing with the affairs related to database. The Database is very important in the recent past due to wider applications in different organizations and institutions; not only profit making but also non-profit making. Today most organizations and sectors which deal with sensitive and important data keep them into the database and thus its security becomes an important concern. Large scale database and its security truly depend on different defensive methods. This paper talks about the basics of database including its meaning, characteristics, role etc. with special focus on different security challenges in the database. Moreover, this paper highlights the basics of security management, tools in this regard. Hence different areas of database security have mentioned in this paper in a simple sense.
Database management systems are important to businesses and organizations because they provide a highly efficient method for handling multiple types of data. Some of the data that are easily managed with this type of system include: employee records, student information, payroll, accounting, project management, inventory and library books. These systems are built to be extremely versatile. A database is a key tool for businesses that can cause serious headaches if breached. There are some serious threats because of hackers done various attempts to steal the data in the database. Various attacks like Sql injection and Stored Injection containing Cross site scripting may change the information in the databases which decreases the truthfulness of the database. This paper, proposes SEPTIC, a mechanism for DBMS attack prevention, which can also assist on the identification of the vulnerabilities in the applications and SQLrand which applies the concept of instruction-set randomization to SQL, creating instances of the language that are unpredictable to the attacker. Queries injected by the attacker will be caught and terminated by the database parser.
IEEE Transactions on Dependable and …, 2005
As organizations increase their reliance on, possibly distributed, information systems for daily business, they become more vulnerable to security breaches even as they gain productivity and efficiency advantages. Though a number of techniques, such as encryption and electronic signatures, are currently available to protect data when transmitted across sites, a truly comprehensive approach for data protection must also include mechanisms for enforcing access control policies based on data contents, subject qualifications and characteristics, and other relevant contextual information, such as time. It is well understood today that the semantics of data must be taken into account in order to specify effective access control policies. Also, techniques for data integrity and availability specifically tailored to database systems must be adopted. In this respect, over the years the database security community has developed a number of different techniques and approaches to assure data confidentiality, integrity, and availability. However, despite such advances, the database security area faces several new challenges. Factors such as the evolution of security concerns, the "disintermediation" of access to data, new computing paradigms and applications, such as grid-based computing and ondemand business, have introduced both new security requirements and new contexts in which to apply and possibly extend current approaches. In this paper, we first survey the most relevant concepts underlying the notion of database security and summarize the most well-known techniques. We focus on access control systems, on which a large body of research has been devoted, and describe the key access control models, namely, the discretionary and mandatory access control models, and the role-based access control (RBAC) model. We also discuss security for advanced data management systems, and cover topics such as access control for XML. We then discuss current challenges for database security and some preliminary approaches that address some of these challenges.
Security, Privacy, and Trust in Modern Data Management, 2007
As organizations increase their reliance on information systems for daily business, they become more vulnerable to security breaches. Though a number of techniques, such as encryption and electronic signatures, are currently available to protect data when transmitted across sites, a truly comprehensive approach for data protection must also include mechanisms for enforcing access control policies based on data contents, subject qualifications and characteristics, and other relevant contextual information, such as time. ...
Summary - A common problem of security for all computer systems is to prevent unauthorized persons from gaining access to the system, either for information, making malicious changes to all or a portion or entire database. Some basic steps to start managing security in the design and implementation of a database rules are presented. . Keywords : cryptography, database management, security , encryption algorithms.
Database security such as confidentiality, integrity, and availability of data/information stored in a database is one of the most crucial and major challenges in the world of Information and Communication Technology. Inaccuracy/Loss of data stored in a database in some cases may be regarded as a loss of human life. That is to say that, database may provide false information that could render the entire organization hopeless if not well protected, and so techniques that protects database from attackers, and any kind of corruption should be carefully implemented and should be given a higher priority. The major factors to consider in database security issues include how to prevent unauthorized access to data, how to prevent unauthorized manipulation of data, as well as how to insure the availability of data when needed. This paper aims at reviewing various database security issues such as data confidentiality requirements, data integrity requirements, and data availability requirements.
Fianza, 2020
Knowledge and implementation of database security measures is a must, especially today's advanced cyber-attacks. Databases are essential because it helps the different levels of database user's efficiency in saving, updating, retrieving and maintaining those important data. IBM Security reported that data breaches cost is $ 3.86 Million in 2020 and Microsoft is not excused on this attack. In order to prevent or lessen the occurrences of such attacks and breaches, there are several preventive measure that a database administrator should always remember such as observing the access privilege basics, implementing safety measures on the database such as encryption on data objects and the database itself. There are also available models or system such as Fingerprinting Transactions (DIDAFIT); SQL Injection and Insider Misuse Detection System (SIIMDS) and; Misuse Detection System for DBMS.
2009
AbstractSecurity models, developed for databases, differ in many aspects because they focus on different features of the database security problem or because they make different assumptions about what constitutes a secure database. This leads to disjointed and incomplete ...
In the contemporary era, Data is the most valuable resource that is used in day to day life from an individual to large organizations. Database contains useful and confidential information so it becomes necessary to protect it from any unauthorized access. Any unauthorized user can try to perform unauthorized activities at unauthorized time on sensitive data. So to prevent the database from any misuse, different security mechanisms are applied to the database to make it secure. This paper focuses on the challenges and security mechanisms in database.
Conference: 7th International Conference on Software Engineering and Applications (SOFEA 2021), 2021
Databases are vulnerable. Public statements by Target, Home Depot, and Anthem following their extremely advertised data breaches are each uniform and succinct on how their breaches unfolded: unauthorized access to those systems that ultimately led to the extraction of sensitive information. A comprehensive strategy to secure a database is over data security. Usually, security events will be related to the later action: illegitimate access to data confidentiality damage, injury to the integrity of knowledge, and loss of data accessibility (Discover). Loss of privacy of data, creating them accessible to others without a right of access is not visible within the database and does not need changes deductible database. This paper addresses these events to confirm database security.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.