Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2015, https://www.researchgate.net/
…
6 pages
1 file
The history of database research backs to more than thirty years, in which created the concept of the relational database system that has become the most fundamental change for organizations strategy. Technology evolution has produced more powerful systems that relate to economic impacts in the recent decade. Organizations must ensure its information and data be secured and confidential. Therefore, they deploy systems or applications have functions, services, and tools for data maintenance and management packed into the so-called Relational Database Management System (RDBMS). Database protection means disallowing illegitimate users to access the database and its sensitive information whether intentional or accidental [4]. Therefore, most of the Such functions contain services plus privileges for authorization to keep firms are taking account of possibility of threats as measures to their database systems. This paper addresses the relational database threats and security techniques considerations in relation to situations: threats, countermeasures (computer-based controls) and database security methods [1,8, 9].
UHD Journal of Science and Technology
Currently, data production is as quick as possible; however, databases are collections of well-organized data that can be accessed, maintained, and updated quickly. Database systems are critical to your company because they convey data about sales transactions, product inventories, customer profiles, and marketing activities. To accomplish data manipulation and maintenance activities the Database Management System considered. Databases differ because their conclusions based on countless rules about what an invulnerable database constitutes. As a result, database protection seekers encounter difficulties in terms of a fantastic figure selection to maintain their database security. The main goal of this study is to identify the risk and how we can secure databases, encrypt sensitive data, modify system databases, and update database systems, as well as to evaluate some of the methods to handle these problems in security databases. However, because information plays such an important r...
2024
Security today is one of the most important and challenging tasks people face in every aspect of their lives. Databases are complex, and many database security Professionals need to understand risk and security issues related to different databases. Even with full knowledge of the database assets, databases are harder to secure because there are unique implementations and procedures for databases. Database security uses a wide range of data security controls to protect databases against any attacks (internal or external). Considering the amount of data stored in a database and the importance of that data for any organization, the organization must secure the data in the database. With the increase in the number of reported cases of data breaches, cybercrime, exposure of sensitive information, disclosure of confidential data to unauthenticated users, and data intrusion, there is a need for industries dependent on Databases to ensure their data security and to defend their data from all these security threats. In today's world, data is generated rapidly, and the final destination of such data is the database. These data are stored in the database for easy and efficient management. All the operations of data manipulation and maintenance are done using Database Management System. Considering the importance of data in an organization, securing the data in the database is essential. A secure database is reciprocated from different possible database attacks, and security models are required to develop databases. These models are different in many aspects as they deal with different database security issues. They may also be different because they make different assumptions about what constitutes a secure database. The history of database research backs more than 30 Years which created the concept of the rationale behind database systems that have become the most fundamental change in an organization's strategic technology. The organization must ensure that its information and data are secured and confidential. Therefore, they deployed systems or application functions, services, and tools for data maintenance and management packed into the so-called Relational Database Management System (RDMS). Such functions contain Services plus privileges for authorization to keep legitimate users (authorized) to access the database. v Database security means disallowing illegitimate users to access the database and its sensitive information, whether unintentionally or accidentally. Therefore, most firms consider possible threats as measures to their database system. Now there is a greater emphasis on database security than in the past as the amount of data stored in the corporate database is increasing, and people depend more on the corporate data for decision-making, customer service management, supply chain management, and so much more. Any loss or unavailability of corporate data will cripple today's organization and seriously affect its performance. Now the unavailability of the database for a few minutes could result in severe losses to the organization. The organization should identify all the risk factors and weak elements from the database security perspective and find solutions to counter and neutralize each threat. To remove security threats, every organization must have a security policy that would be implemented. In security policy, authentication plays a vital role because if authentication is proper, then there are fewer chances of threats. Different users have different access rights to different database objects. Access Control Mechanisms deal with managing access rights. It is the essential technique to protect the data objects in the databases and is supported by most DBMS. This study focuses on an appraisal of database security in a business environment, a case study of Fintrak Software Company Limited.
In today's world, data is generated at a very rapid speed and final destination of such data is database. Data is stored in database for easy and efficient way to manage these data. All the operations of data manipulation and maintenance are done using Database Management System. Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. A secure database is the one which is reciprocated from different possible database attacks. Security models are required to develop for databases. These models are different in many aspects as they are dealing with different issues of the database security. They may different also because of they are taking different assumptions about what constitutes a secure database. So, it becomes very difficult for database security seekers to select appropriate model for securing their database. In this paper, we have discussed some of the attacks that can be possible with its counter measures and its control methods that can be possible. Securing database is important approach for the planning of explicit and directive based database security requirements. Ensuring security for database is very critical issues for the companies. As complexity of database increases, we may tend to have more complex security issues of database.
Security, Privacy, and Trust in Modern Data Management, 2007
As organizations increase their reliance on information systems for daily business, they become more vulnerable to security breaches. Though a number of techniques, such as encryption and electronic signatures, are currently available to protect data when transmitted across sites, a truly comprehensive approach for data protection must also include mechanisms for enforcing access control policies based on data contents, subject qualifications and characteristics, and other relevant contextual information, such as time. ...
IEEE Transactions on Dependable and …, 2005
As organizations increase their reliance on, possibly distributed, information systems for daily business, they become more vulnerable to security breaches even as they gain productivity and efficiency advantages. Though a number of techniques, such as encryption and electronic signatures, are currently available to protect data when transmitted across sites, a truly comprehensive approach for data protection must also include mechanisms for enforcing access control policies based on data contents, subject qualifications and characteristics, and other relevant contextual information, such as time. It is well understood today that the semantics of data must be taken into account in order to specify effective access control policies. Also, techniques for data integrity and availability specifically tailored to database systems must be adopted. In this respect, over the years the database security community has developed a number of different techniques and approaches to assure data confidentiality, integrity, and availability. However, despite such advances, the database security area faces several new challenges. Factors such as the evolution of security concerns, the "disintermediation" of access to data, new computing paradigms and applications, such as grid-based computing and ondemand business, have introduced both new security requirements and new contexts in which to apply and possibly extend current approaches. In this paper, we first survey the most relevant concepts underlying the notion of database security and summarize the most well-known techniques. We focus on access control systems, on which a large body of research has been devoted, and describe the key access control models, namely, the discretionary and mandatory access control models, and the role-based access control (RBAC) model. We also discuss security for advanced data management systems, and cover topics such as access control for XML. We then discuss current challenges for database security and some preliminary approaches that address some of these challenges.
2014
In this paper, we describe the different database architecture and security measures. The architecture of a database system is greatly influenced by the underlying computer system on which the database system runs. Database systems can be centralized, where one server machine executes operations on the database. Database systems can also be designed to exploit parallel computer architectures. Distributed databases span multiple geographically separated machines. Ensuring the security of databases is also a complex issue when discussing database architecture. The purpose of this paper is to highlight and identify the architectures of database systems running on server systems, which are used in centralized and client–server architectures and the security measures pertaining to database systems.
2009
AbstractSecurity models, developed for databases, differ in many aspects because they focus on different features of the database security problem or because they make different assumptions about what constitutes a secure database. This leads to disjointed and incomplete ...
International Journal of Management, Technology, and Social Sciences (IJMTS), 2019
Information is the core and most vital asset these days. The subject which deals with Information is called Information Science. Information Science is responsible for different information related affairs from collection, selection, organization, processing, management and dissemination of information and contents. And for this information related purpose Information Technology plays a leading role. Information Technology has different components viz. Database Technology, Web Technology, Networking Technology, Multimedia Technology and traditional Software Technology. All these technologies are responsible for creating and advancing society. Database Technology is concerned with the Database. It is worthy to note that, Database is concerned with the repository of related data in a container or base. The data, in Database normally stored in different forms and Database Technology play a lead role for dealing with the affairs related to database. The Database is very important in the recent past due to wider applications in different organizations and institutions; not only profit making but also non-profit making. Today most organizations and sectors which deal with sensitive and important data keep them into the database and thus its security becomes an important concern. Large scale database and its security truly depend on different defensive methods. This paper talks about the basics of database including its meaning, characteristics, role etc. with special focus on different security challenges in the database. Moreover, this paper highlights the basics of security management, tools in this regard. Hence different areas of database security have mentioned in this paper in a simple sense.
In the contemporary era, Data is the most valuable resource that is used in day to day life from an individual to large organizations. Database contains useful and confidential information so it becomes necessary to protect it from any unauthorized access. Any unauthorized user can try to perform unauthorized activities at unauthorized time on sensitive data. So to prevent the database from any misuse, different security mechanisms are applied to the database to make it secure. This paper focuses on the challenges and security mechanisms in database.
Data security is an emerging concern proved by an increase in the number of reported cases of loss of or exposure to sensitive data by some unauthorized sources. Security is a composed part in which it protects and secures the sensitive data or database management software from some unauthorized user or from malicious attacks. In this paper we will be presenting some of the common security techniques for the data that can be implemented in fortifying and strengthening the databases.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Journal Article, 2024
International Journal of Computer Applications, 2014
IAEME PUBLICATION, 2023
International Journal of Advance Research and Innovative Ideas in Education, 2017
Information and Software Technology, 1994
Science insights, 2023
International Journal of Innovation in Computer Science and Information Technology, 2021
Conference: 7th International Conference on Software Engineering and Applications (SOFEA 2021), 2021