Academia.eduAcademia.edu

Securityof DBMS

2015, https://www.researchgate.net/

Abstract

The history of database research backs to more than thirty years, in which created the concept of the relational database system that has become the most fundamental change for organizations strategy. Technology evolution has produced more powerful systems that relate to economic impacts in the recent decade. Organizations must ensure its information and data be secured and confidential. Therefore, they deploy systems or applications have functions, services, and tools for data maintenance and management packed into the so-called Relational Database Management System (RDBMS). Database protection means disallowing illegitimate users to access the database and its sensitive information whether intentional or accidental [4]. Therefore, most of the Such functions contain services plus privileges for authorization to keep firms are taking account of possibility of threats as measures to their database systems. This paper addresses the relational database threats and security techniques considerations in relation to situations: threats, countermeasures (computer-based controls) and database security methods [1,8, 9].

Key takeaways

  • The database scheme of encryption should enhance sharing of data within the database without losing data privacy [2,[6][7][8][9].
  • It has four modules: database cache, database encryption algorithm, virtual database, and negative database conversion.
  • Many factors to get strong encryption into RDBMS:
  • It is a simple way using the encryption/decryption method by RDBMS.
  • This report is to explain different methods of database security.