StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Database security issues - Research Paper Example

Cite this document
Summary
Databases having become more critical in the delivery of the enterprise promise. However, with the growth in database systems’ demand, security issues concerning the safety of…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.3% of users find it useful
Database security issues
Read Text Preview

Extract of sample "Database security issues"

Download file to see previous pages

The paper analyzes security issues concerning both web based and traditional databases. Database inference is a security issue that multi level databases are prone to. Inference can be defined as the process in which a user can infer restricted information from results of queries. Typically, inference occurs when a user at a lower security level is able to put together trivial information accessible at that level to deduce a fact that requires a higher security clearance to access. To be able to access the higher security level information, a user may exploit correlated data.

If for instance a user can access the values of H and K, then for a case whereby Z=H*K, the user can correctly infer the value Z even without security clearance. Another inference channel is missing data. When a user receives null values when querying certain fields, the restricted information can be inferred. A practical example is when a user cannot slot in a booking and yet the space is not yet reserved. Through cross-referencing, it can be known that some record is already stored in the given field.

Another aspect of the inference problem is caused by value constraints. For example if attribute Y is not classified and X is secret with the constraint X+Y>100, the value of X can be inferred through a query. A technique to remedy the inference problem is through polyinstantiation. This is a relationship whereby elements of a given attribute are associated but have multiple independent instances of instantiation. This may end up creating a new problem of double records in the long run. According to Natan (2003), “the entries may result in major problems if the database is for mission critical systems like airliners.

” The other security issue is SQL Injection. This refers to a scenario whereby unauthorized MySQL statement is run on a database. This technique takes advantage of un-validated user input vulnerability to pass commands from a web

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Database security issues Research Paper Example | Topics and Well Written Essays - 1250 words”, n.d.)
Database security issues Research Paper Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/miscellaneous/1591703-database-security-issues
(Database Security Issues Research Paper Example | Topics and Well Written Essays - 1250 Words)
Database Security Issues Research Paper Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/miscellaneous/1591703-database-security-issues.
“Database Security Issues Research Paper Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/miscellaneous/1591703-database-security-issues.
  • Cited: 0 times

CHECK THESE SAMPLES OF Database security issues

Helen`s Trading Card Company

An effectual Information System is considered necessary for business today, be it large scale enterprises or small scale businesses.... An information system, as the name suggests, helps to manage all the information a business has about its stakeholders and itself.... hellip; The question is what really is an Information System Why is it necessary What will it achieve What stages of a Systems Development Methodology are involved in designing it Answers to such and other questions, in the context of Helen's Trading Card Company, will be discussed in this paper....
13 Pages (3250 words) Case Study

RFID and the safety concerns of consumers

Understanding the RFID devices and how they work is critical for analyzing privacy issues that surround this technology.... The main components of an RFID system are a chip/tag, reader, and database.... A reader scans the tag for data and sends the information to a database, which stores the data contained on the tag....
15 Pages (3750 words) Essay

Database System Specifications in Mayo Clinic Medical Center

The paper "database System Specifications in Mayo Clinic Medical Center" highlights that the Mayo Clinic Medical Center's database is aimed to offer better business support.... hellip; In this analysis report, I have outlined an innovative database technology implementation at Mayo Clinic Medical Center business.... In this report, I have outlined some of the main aspects of the database implementation, operation and deployment....
8 Pages (2000 words) Case Study

Explain database security issues

The role of metadata is helping individuals in locating, as well as understanding,… It also offers the history of given data by describing the data's structure and content, its generator and preserver, its time of collection and publication, its geographic or storage location, reason for its creation, and means of producing, processing, or modelling it College: Explain database security issues What is Metadata?... Encryption and Relation to security As the most effective means of enhancing security of data, encryption refers to the translation of data into ciphertext form, which cannot be understood easily by illicit individuals....
2 Pages (500 words) Essay

Development of database security

The essay "Development of database security" presented various techniques for implementing security features in a database which can lead an organization to have a logically secured database.... The database security is concerned with the unauthorized access or misuse of the authorized user which leads to the leakage of personal or potential information.... Therefore, it can be stated that the database security is one of the critical factors to be achieved in developing a dependable database....
4 Pages (1000 words) Term Paper

Analysis of Database Security

The paper "Analysis of database security " describes that Nathan Aaron states that most people value database security since they ensure that the data is secured, confidential, and maintains its integrity.... He gives an example citing that lack of a proper security system in most cases leads to losses.... hellip; Aaron concludes that security is very crucial for all databases stored as they ensure that data remains secured and only the right people are able to access it whenever they need it....
11 Pages (2750 words) Annotated Bibliography

The Privacy and Security Related Issues in Databases

Putting attention on database security only, on the other hand, will not make sure a secure database.... The following issues must be addressed in a wide-ranging database security plan: (Hoffer, Prescott, & McFadden, 2007, p.... This research paper presents a detailed analysis of the privacy and security related issues in databases.... issues and threats to data security may be straight threats to the database.... This paper assesses the key aspects of business databases security and privacy....
5 Pages (1250 words) Research Paper

Implementing Database Security

This report "Implementing database security" discusses security and privacy that are an essential concept of building systems.... n order to practice implementing database security and auditing, we tried to find a system which, needs to be secure and the users who deal with it need to protect their privacy so our work on this system would be useful and improvable.... Encrypting the data during its moves is one of these issues besides, integrity, auditing, SQL injection, and access control....
11 Pages (2750 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us