Nobody downloaded yet

Database Security: A Comprehensive Approach - Annotated Bibliography Example

Comments (0) Cite this document
Summary
The journal states that database security is a major concern that has been evident in many reported cases whereby massive data has been lost due to exposure of data to unauthorized people. Considering the increased usage, collection and sharing of data through electronic media,…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.8% of users find it useful
Database Security: A Comprehensive Approach
Read TextPreview

Extract of sample "Database Security: A Comprehensive Approach"

Download file to see previous pages Data security systems incorporate the protection of data’s disclosure to increase its safety, protection from unauthorized personnel, and the accessibility and recovery of data after malicious activities. The author states that the Defense Information Systems Agency of the US Department of Defense provide that all the information that is secured through the database securities is protected from every unauthorized access, protected from any threats, assured of quality maintenance, and in the end, its integrity is maintained.
The best way to ensure protection of data is by limiting is access maximally through creation of passwords and usernames. Additionally, one can also limit data access through defining access controls of specific resources only to specific and authorized persons. The journal also advocates for increased security systems for databases since most of that databases are found in the internet, hence prone to attacks. Consequently, there is a great need to condense the vulnerability of the threats, especially the SQL injection, which is normally tricked to perform unauthorized commands. Consequently, limiting access to this information would be done through a password and username system whereby only the authorized user is allowed to login into the site or database. However, the author also suggests that database auditing is also an important way to ensure data security since it is able to monitor all activities done in the database. Auditing tracks all the changes made to the database, the time, and the person who accessed the information, however, it is not able to prevent any breaches that occur.
The source is credible since the author is an excellent Professor in Kennesaw State University, working t the department of Computer science and Information Systems. Additionally, she is determined to ensure that all the IT problems are solved and has an experience of ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Database Security: A Comprehensive Approach Annotated Bibliography”, n.d.)
Database Security: A Comprehensive Approach Annotated Bibliography. Retrieved from https://studentshare.org/information-technology/1653843-database-security-a-comprehensive-approach
(Database Security: A Comprehensive Approach Annotated Bibliography)
Database Security: A Comprehensive Approach Annotated Bibliography. https://studentshare.org/information-technology/1653843-database-security-a-comprehensive-approach.
“Database Security: A Comprehensive Approach Annotated Bibliography”, n.d. https://studentshare.org/information-technology/1653843-database-security-a-comprehensive-approach.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Database Security: A Comprehensive Approach

Methods for Database Security

...Database security has become one of the most important issues in today’s world of technology. This paper introduces the issue of database security in an organization by introducing the need and importance of database security. This is followed by a description of the main types of security threats that an organization would face, though the list is not conclusive. The main part of this paper discusses the ways that an organization can use to counter the threats identified in the previous parts of the paper. The methods to be used include data encryption, web-based data security, authentication and access...
10 Pages(2500 words)Essay

Database and Enterprise Application Security

...Database and Enterprise Application Security Latest developments in internet have evolved to an elevated standard of technology. At the present, more and more corporations are making use of the internet in order to carry out their business related tasks. Additionally, the web based systems and business applications have offered better support and facilities for the business and personal level. However, these facilities have also created some concerns regarding web based security and privacy. In this scenario, there is an awful need for implementing proper and appropriate mechanisms in order to ensure internet security. In this paper I will present a deep analysis of...
7 Pages(1750 words)Essay

Database security Questions

...?DATABASE SECURITY QUESTIONS Database Security Questions Affiliation Q As a new Database Administrator, the first thing that you should do is developing a Database Security Plan As a new database administrator, the primary thing which we should do is to secure it from illegal and wrong access. Yet, the security of the database is considered just a sub-module of the entire computer security analysis. In this scenario, the limitations are obviously described along with reliable direction given to everyone working inside the corporation....
3 Pages(750 words)Essay

Database Security

..., A., & Zgola, M. (2011). Database security. Boston, Mass: Course Technology. Bertino, E. and Sandhu, R. (2005). Database security - concepts, approaches, and challenges. Dependable and Secure Computing, IEEE Transactions on, 2 (1), pp. 2-19. Retrieved from: http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=1416861&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D1416861 [Accessed: 11 Sep 2013]. Mcafee (n.d.). McAfee Vulnerability Manager for Databases. Retrieved September 11, 2013, from http://www.mcafee.com/hk/products/database-security/index.aspx Mullins, C. (2013). Database administration: The complete guide to DBA practices and procedures... ? Database Security Shakeel [Pick the...
4 Pages(1000 words)Essay

Database security risks

...Running head: Database security Risks Database Security Risks Affiliation December 2009 Data and information are the most significant and valuable resources for every business or organization. Database is the main tool for managing and storing these precious resources. Therefore, databases have become the basic need for every organization or business. The databases are vital for the business and corporate management. In case of damage to this business resource, the whole business can go down. This paper will present detailed analysis of the database security risks. This paper will assess...
3 Pages(750 words)Term Paper

Database security issues

...Database Security Issues Hellion Craig World There has been a tremendous increase in data in the last decade and the trend is poised to continue. Databases having become more critical in the delivery of the enterprise promise. However, with the growth in database systems’ demand, security issues concerning the safety of the data stored has become a vital issue. This paper seeks to discuss some of the database security issues that are threaten to compromise the information stored by organizations. There has been a rapid growth uptake of cloud computing and hence database systems that are web based face...
5 Pages(1250 words)Research Paper

Explain database security issues

...College: Explain Database Security Issues What is Metadata? Metadata refers to the data used in of other data. Metadata illustrates the quality, content, condition, as well as other features concerning data inscribe in an ordinary FGDC layout. The role of metadata is helping individuals in locating, as well as understanding, data. It also offers the history of given data by describing the data’s structure and content, its generator and preserver, its time of collection and publication, its geographic or storage location, reason for its creation, and means of producing, processing, or modelling it (Cox et al, 2012). A Concurrent Update A concurrent update refers to the situation in which more than one...
2 Pages(500 words)Essay

Development of database security

...and in the future.” (Neilson and Parui, 2009) The database security is one of the non-functional requirements which would only be fulfilled after completing all the functional requirements of the database. One of the reasons for not implementing secured databases is the improper design that does not act in accordance to organizational security policies. This document presents the importance of database security and critically reviews the various reasons for improper security implementation. Moreover, the document provides comprehensive analysis of the techniques and...
4 Pages(1000 words)Essay

Database Security

...Database Security Database Security Introduction A database can be described as a compilation of logically consistent data that bears inherent meaning. Data bases are designed and populated with data that relates to a specific purpose and an interaction with the events of the real world and active audiences interested in the contents (Shekhar & Chawla, 2003). They are designed to operate large amounts of information by capturing, storing, managing and retrieving that information. Computerized databases are created and maintained by database management systems (DBMS) or a collection of application programs specifically...
12 Pages(3000 words)Research Paper

Database security

... Database Security and Privacy Principles Personal information (PI) could be gathered, held, and used for many different purposes and through different methods. Once information has been collected, various legal and ethical issues govern the right for access to such information. Some information is deemed to be confidential and this means that third parties may not acquire it legally (Doyle & Bagaric, 2005). Several laws relating to database security and privacy have been promulgated in different countries across the world. Database security entails the protection of collected information. If this is not done, then databases are subjected to several threats that could lead to loss of integrity, loss of availability, and loss... ). Privacy law...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Annotated Bibliography on topic Database Security: A Comprehensive Approach for FREE!

Contact Us