StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Logical and Physical Database Security - Essay Example

Cite this document
Summary
The paper "Logical and Physical Database Security" discusses that there are several countermeasures to avoid physical data theft vulnerability include: the installation of security cameras, alarms, electronic access control implementation on the doors, and allocation of security guards…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.5% of users find it useful
Logical and Physical Database Security
Read Text Preview

Extract of sample "Logical and Physical Database Security"

?Introduction All the organizations deal with information of the products to be developed sold and or people working in the organization. As the higher management utilizes the information for making informed decisions, therefore, it is one of the crucial assets of the organization. Keeping in view the importance of the information and its enduring usage, it is required that the information needs to be secured and accurately stored in reliable database sources. “Information is an organizational asset, and, according to its value and scope, must be organized, inventoried, secured, and made readily available in a usable format for daily operations and analysis by individuals, groups, and processes, both today and in the future.” (Neilson and Parui, 2009) The database security is one of the non-functional requirements which would only be fulfilled after completing all the functional requirements of the database. One of the reasons for not implementing secured databases is the improper design that does not act in accordance to organizational security policies. This document presents the importance of database security and critically reviews the various reasons for improper security implementation. Moreover, the document provides comprehensive analysis of the techniques and strategies are being utilized to overcome the database security issues (Abramov, Anson, Dahan, Shoval and Sturm, 2012). Database Security The database security is concerned with the unauthorized access or misuse of the authorized user which leads to the leakage of personal or potential information. A database is said to be a reliable data storage source if it does not compromise on confidentiality (data security), integrity (the correctness of data) and availability. The integrity of data is dependent on the data gathering and storing process, moreover, if the database could be accessed by unauthorized users can influence the correctness of data. Therefore, it can be stated that the database security is one of the critical factors to be achieved in developing a dependable database. There are many techniques could be utilized for developing a secured database (Kayarkar, n.d) includes: the access control (implementing data access rights to the users), database monitoring (to review the actions performed on the database), authentication (identifying the accurate user) and encryption (data encoding). Moreover, the data can be made secure by the application security and database integrity controls (Oracle, 2003). Logical and Physical Database Security The Elmasri and Navathe in 2004 a methodology have been introduced for developing a database design. The database designing methodology has following three (3) main phases include: the Conceptual database design, Logical database design, and Physical database design. As the objective of this document s to present a review of the database security concerns for avoiding illegal access, therefore, the document limits the discussion to the logical database design phase. In order to implement the security policies, the logical database design is the most critical phase. The database security can be implemented while designing the database and developing the software application. There are certain techniques need to be implemented for the development of a secured database. One of the techniques is the general security specification technique that can be implemented using Unified Modeling Language (UML) use cases. In order to implement the user privileges the database designer needs to implement the access control specification technique. One of the limitations of these techniques include these methods do not have provisions to tackle the organizational security policy. Keeping in view the limitations, a new security model has been suggested in which the database designers can implement the organizational security policy patterns which would be implemented while application development. In the design phase the database designers can develop security constraints following organizational policy. The implementation phase deals with transforming the data model in the Structured Query Language (SQL) with already developed security constraints (Abramov, Anson, Dahan, Shoval and Sturm, 2012). There are various principals identified and needs to be followed for protecting the data from the illegitimate access of users. The first principal converses for gathering the information about the data to be stored in the database. In order to comply the principal several questions need to be answered and these include: what, whose, why and how the personal data are being processed by the data controller. It would help the data controller to know whether the data under processing is sensitive or not. It is worthwhile to identify and nominate the data protection officer to fix responsibilities and accountability. The second principal states about analyzing the data to investigate whether the data is gathered obeying the laws, moreover, it identifies the criterion for legitimacy. The third principal presents the implementation techniques while maintaining compliance with the principals. It is pertinent to know privacy statements, secret company documents, and scripts. The fourth principal guides to develop a strong relationship with the staff (who has access the personal data), moreover, developing relationship with data processors (an employee for processing data). In the last, the data transfers and data exports should be done while complying the Data Protect Directive and Data Protection Act. The study guides to protect data from the physical unauthorized access while developing relationships with the staff (Room, n.d). Conclusion The correct decisions made on accurate information may lead the organization to success, whereas, the organizations cannot make a correct decision on the faulty information. The database designers are used to develop simply incorrect design just for fulfilling the requirements of the database; however, the designers should also consider the complicated processes of an organization along with security policies. The data should be secured logically as well as conforming to organizational policies and this can be done while designing the database. The document presented various techniques for implementing security features in a database which can lead an organization to have a logically secured database. Moreover, the data should be kept safe from the physical theft threat on the database. There are several counter measures to avoid the physical data theft vulnerability include: the installation of security cameras, alarms, electronic access control implementation on the doors and allocation of security guards (Gergi, 2010). Moreover, there are diverse guidelines and principals to avoid physical data theft which have been discussed in the document. Reference List Abramov, J., Anson, O., Dahan, M., Shoval P., and Sturm, A., 2012. A methodology for integrating access control policies within database development. Computers & Security, SciVerse ScienceDirect, Elsevier Ltd. Elmasri, R., and Navathe, S. B., 2004. Fundamentals of Database Systems. Addison Wesley, pp 58 - 97 Gergi, R. (2010). Logical and Physical Security – What the major Differences Are ? [online] Available at: [Accessed 18 April 2013] Kayarkar, H., n.d. Classification of Various Security Techniques in Databases and their Comparative Analysis. Navi Mumbai: M.G.M’s College of Engineering and Technology Neilson, P., and Parui, U., 2009. Microsoft SQL Server 2008 Bible. CrossPoint Boulevard, Willey Publishing Incorporation Oracle., 2003. Database Security. [online] Available at: [Accessed 17 April 2013] Room, S., n.d. Data Protection and Compliance in Context. Viva, the British Computer Society Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Criticall review for secure Database Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Criticall review for secure Database Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1474396-criticall-review-for-secure-database
(Criticall Review for Secure Database Essay Example | Topics and Well Written Essays - 1000 Words)
Criticall Review for Secure Database Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1474396-criticall-review-for-secure-database.
“Criticall Review for Secure Database Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1474396-criticall-review-for-secure-database.
  • Cited: 0 times

CHECK THESE SAMPLES OF Logical and Physical Database Security

Smart Database Design to Avoid Fault Data

One of the reasons is improper database design, therefore in order to avoid poor quality data in databases, features of good database design along with guidelines for developing a smart database to avoid faulty data have been provided in this paper.... eywords: database design, data quality, avoiding faulty information, Garbage in Garbage out (GIGO), database normalization, smart database design....
9 Pages (2250 words) Research Paper

Illegal Physical or Internet Intrusion

(Mynihan, 2007) database security is of inevitable importance because any malfunctioning did with the data in it, whether physical or virtual if not corrected promptly can result in the loss of system or data integrity.... enior director of security for Oracle, Wynn White mentions his observations about database security in the following words: 'According to one recent Forrester study, 80 percent of data security breaches involve insiders, employees or those with internal access to an organization, putting information at risk....
5 Pages (1250 words) Essay

Software Implementing Database Security

database security Shakeel [Pick the date] Introduction As more and more increase in information day by day which results in increase in data, this data is stored on more and more database systems which are usually distributed.... The vulnerability to the database security include unauthorized access by hackers or outside attacks or misuse by authorized personnel which are database users, administrators or system managers.... Data integrity can also be implemented through other ways than database security where different error checking and validations must be checked in order to provide accuracy of data....
4 Pages (1000 words) Essay

Development of database security

The database designing methodology has following three (3) main phases include the Conceptual database design, Logical database design, and physical database design.... The essay "Development of database security" presented various techniques for implementing security features in a database which can lead an organization to have a logically secured database.... The database security is concerned with the unauthorized access or misuse of the authorized user which leads to the leakage of personal or potential information....
4 Pages (1000 words) Term Paper

Distributed databases

IJCSNS International Journal of Computer Science and Network security, VOL.... This paper seeks to find a suitable distributed database that can fit two small retail stores. ... his paper Distributed Databases Introduction A distributed database (DDB) is a compilation of numerous, logically interconnected databases distributed through a computer system.... This paper seeks to find a suitable distributed database that can fit two small retail stores....
2 Pages (500 words) Research Paper

Database Security

The paper "database security" states that generally, database security needs stem from the requirement to protect data.... database security is concerned with aspects aimed at protecting the contents of the database, users and owners.... Therefore, specific measures can be recommended for specific security concerns.... Organizations need to establish and maintain security measures that address application-level concerns....
12 Pages (3000 words) Coursework

Logical and Physical Structures of the Database

The paper "logical and physical Structures of the Database" analyzes communication mechanisms.... he control files constitute the database data (physical database information).... Every database instance is connected to the only existing one b=database.... Connection in a database instance is the communication that occurs between the instance and the user process.... Session in a database instance, on the other hand, is the specific connection of a database user to an instance through the database user process that it stands for in the current user login to the instance....
18 Pages (4500 words) Assignment

Relational Database Management System Critique

The paper "Relational Database Management System Critique" focuses on discussing the alternatives of RDBMS and big data under the subtopics of volumes of data, types of data, data storage, and security.... Oracle database is a widely used and trusted RDBMS because of its security features.... racle database classifies security into two categories: system security and data security.... According to Elmasri and Navathe (2015), they argue that at the system level, system security is used to allow users to control access and use the database....
12 Pages (3000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us