Free

Database security - Essay Example

Comments (0) Cite this document
Summary
Once information has been collected, various legal and ethical issues govern the right for access to such information. Some information is deemed to be…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
Database security
Read TextPreview

Extract of sample "Database security"

Database Security and Privacy Principles Personal information (PI) could be gathered, held, and used for many different purposes and through different methods. Once information has been collected, various legal and ethical issues govern the right for access to such information. Some information is deemed to be confidential and this means that third parties may not acquire it legally (Doyle & Bagaric, 2005). Several laws relating to database security and privacy have been promulgated in different countries across the world. Database security entails the protection of collected information. If this is not done, then databases are subjected to several threats that could lead to loss of integrity, loss of availability, and loss of confidentiality (IFIP, 2013).
Privacy protection is both a personal and fundamental right for any individual. It is the right of every individual to hold the expectation that organizations that collect information will ensure confidentiality of personal information. One way in which this can be achieved is by ensuring that organizations will collect, maintain, utilize, and disseminate personal information and data only to the extent that is necessary to enable them perform their functions (Doyle & Bagaric, 2005).
Privacy laws regulate how entities handle personal information. They also include obligations that govern the collection, use, disclosure, and access to personal information, requiring entities to observe reasonable measures for the protection of personal information in their possession from misuse, loss and from unauthorized access, use, modification or disclosure.
The NIST triad for privacy is set under the above set of requirements for privacy. It is a model for information security that incorporates three main components namely confidentiality, integrity, and availability. Each of these components in the triad stresses a key objective for information security. Confidentiality requires that data is only availed to appropriate parties, integrity means the certainty that there is no tampering with the data prior to and after collection, and availability means that the data will be made available as and when needed (Nemati, 2008).
References
Doyle, C., & Bagaric, M. (2005). Privacy law in Australia. Sydney: Federation Press.
IFIP TC11/WG 11.3 International Conference on Database Security, & In Jajodia, S. (2013). Database security XII: Status and prospects : IFIP TC11 WG11.3 Twelfth International Working Conference on Database Security, July 15-17, 1998, Chalkidiki, Greece.
Kenyon, A. T., & Richardson, M. (2006). New dimensions in privacy law: International and comparative perspectives. Cambridge [u.a.: Cambridge Univ. Press.
Nemati, H. R. (2008). Information security and ethics: Concepts, methodologies, tools and applications. Hershey PA: Information Science Reference. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Database security Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Database security Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1691888-database-security
(Database Security Essay Example | Topics and Well Written Essays - 250 Words)
Database Security Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1691888-database-security.
“Database Security Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1691888-database-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Database security

Methods for Database Security

...Database security has become one of the most important issues in today’s world of technology. This paper introduces the issue of database security in an organization by introducing the need and importance of database security. This is followed by a description of the main types of security threats that an organization would face, though the list is not conclusive. The main part of this paper discusses the ways that an organization can use to counter the threats identified in the previous parts of the paper. The methods to be used include data encryption, web-based data security, authentication and access...
10 Pages(2500 words)Essay

Database security Questions

...?DATABASE SECURITY QUESTIONS Database Security Questions Affiliation Q As a new Database Administrator, the first thing that you should do is developing a Database Security Plan As a new database administrator, the primary thing which we should do is to secure it from illegal and wrong access. Yet, the security of the database is considered just a sub-module of the entire computer security analysis. In this scenario, the limitations are obviously described along with reliable direction given to everyone working inside the corporation....
3 Pages(750 words)Essay

Database Security for Electronics Ltd

...PART A Database Security for Electronics Ltd Introduction A database is the collection of the information which is organized in order to be accessed easily; it can be managed and, being updated. Databases are stored in database servers that are the most significant servers in every company. In an organization, databases store information about the client’s details, the financial information, and the details of the human resource and, all the data that may be of significant to the company. All the data that are stored in the database should be secured properly. Database...
8 Pages(2000 words)Essay

The extent to which the understanding of the history and development of business help in the understanding of business today

5 Pages(1250 words)Essay

Database Security

...? Database Security Shakeel [Pick the Introduction As more and more increase in information day by day which results in increase in data, this data is stored on more and more database systems which are usually distributed. Big and medium businesses are susceptible to security breaches from outside which might compromise their competitive advantage. For the security breaches within data transfer, different encryption techniques are employed for the safe data travel but the data connecting to database servers must be subjected to policies and mechanisms to protect it from vulnerabilities. A broad spectrum of information security controls is employed on the database servers to protect it from vulnerabilities to its confidentiality... ,...
4 Pages(1000 words)Essay

Database security issues

...Database Security Issues Hellion Craig World There has been a tremendous increase in data in the last decade and the trend is poised to continue. Databases having become more critical in the delivery of the enterprise promise. However, with the growth in database systems’ demand, security issues concerning the safety of the data stored has become a vital issue. This paper seeks to discuss some of the database security issues that are threaten to compromise the information stored by organizations. There has been a rapid growth uptake of cloud computing and hence database systems that are web based face...
5 Pages(1250 words)Research Paper

Explain database security issues

...College: Explain Database Security Issues What is Metadata? Metadata refers to the data used in of other data. Metadata illustrates the quality, content, condition, as well as other features concerning data inscribe in an ordinary FGDC layout. The role of metadata is helping individuals in locating, as well as understanding, data. It also offers the history of given data by describing the data’s structure and content, its generator and preserver, its time of collection and publication, its geographic or storage location, reason for its creation, and means of producing, processing, or modelling it (Cox et al, 2012). A Concurrent Update A concurrent update refers to the situation in which more than one...
2 Pages(500 words)Essay

Development of database security

...Development of database security Introduction All the organizations deal with information of the products to be developed / sold and people working in the organization. As the higher management utilizes the information for making informed decisions, therefore, it is one of the crucial assets of the organization. Keeping in view the importance of the information and its enduring usage, it is required that the information needs to be secured and accurately stored in reliable database sources. “Information is an organizational asset, and, according to its value and scope, must be organized, inventoried, secured, and made readily available in a usable...
4 Pages(1000 words)Essay

Database Security

...Database Security Database Security Introduction A database can be described as a compilation of logically consistent data that bears inherent meaning. Data bases are designed and populated with data that relates to a specific purpose and an interaction with the events of the real world and active audiences interested in the contents (Shekhar & Chawla, 2003). They are designed to operate large amounts of information by capturing, storing, managing and retrieving that information. Computerized databases are created and maintained by database management systems (DBMS) or a collection of application programs specifically...
12 Pages(3000 words)Research Paper

Database Security: A Comprehensive Approach

...Database security: of Scime, A. . Database Security: What Need to Know. Journal Of Information Technology Education, 23(9), 132-172. The journal states that database security is a major concern that has been evident in many reported cases whereby massive data has been lost due to exposure of data to unauthorized people. Considering the increased usage, collection and sharing of data through electronic media, the author suggests that it is very important to ensure that the data is secured to prevent its loss. Through database security systems, data is restricted only to authenticated...
10 Pages(2500 words)Annotated Bibliography
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Database security for FREE!

Contact Us