StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Database Security Controls - Literature review Example

Comments (0) Cite this document
Summary
This paper is about a database as a collection of data that is stored in large disks and units and can be accessed easily with the help of software. It is also known as the electronic filing system. A database is an important requirement for the organizations working all around the world…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Database Security Controls
Read Text Preview

Extract of sample "Database Security Controls"

Download file to see previous pages Databases are a new way to save information and store big quantities of data in specific units around the world. “A database is a data structure that stores organized information” (Rabassa, 2013). However, we can see that with all the changes and innovations, the risk on security of the databases is a new challenge and constant concern for everybody in our time. Keeping in mind the recent attacks to different companies and government entities, this paper will help to identify any of the controls that administrators and IT professionals will need to take in consideration to secure all the databases. The research paper will also provide the perspective on how companies are keeping secure the diverse data and all the steps and policies that companies need to take in consideration in the new era of cybercrimes.
In this paper, we will see how IT professionals and the administration can help to secure the database of the company. We will discuss in detail the different risks a database has and the importance the database holds in the success of the company. This paper also outlines the damage, the breach in the security in database can cause.
The aim of this research is to analyze the current attacks and to assess the security of corporate databases and the related issues which are increasingly becoming significant as enterprises are growing and considering the data they have stored in them. In the last couple of months the news said, the databases for different stores and organizations were attacked by different group of hackers, these people steal sensitive information. There is a high alert for the public and the companies, but no one knows yet how high is the damage due the lack of controls or the minimal security control of each specific database (Elmasri, 2007). ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Database Security Controls Research Paper Example | Topics and Well Written Essays - 3000 words, n.d.)
Database Security Controls Research Paper Example | Topics and Well Written Essays - 3000 words. https://studentshare.org/information-technology/1847707-database-security-controls
(Database Security Controls Research Paper Example | Topics and Well Written Essays - 3000 Words)
Database Security Controls Research Paper Example | Topics and Well Written Essays - 3000 Words. https://studentshare.org/information-technology/1847707-database-security-controls.
“Database Security Controls Research Paper Example | Topics and Well Written Essays - 3000 Words”. https://studentshare.org/information-technology/1847707-database-security-controls.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Database Security Controls

Methods for Database Security

...Database Security Controls... Database Security Controls... Database security has become one of the most important issues in today’s world of technology. This paper introduces the issue of database security in an organization by introducing the need and importance of database security. This is followed by a description of the main types of security threats that an organization would face, though the list is not conclusive. The main part of this paper discusses the ways that an organization can use to counter the threats identified in the previous parts of the paper. The methods to be used include data encryption, web-based data security, authentication and access control, timeliness and security in real-time database systems, SQL Injections,...
10 Pages (2500 words) Essay

Database security Questions

...Database Security Controls... Database Security Controls... SECURITY QUESTIONS Database Security Questions Affiliation Q As a new Database Administrator, the first thing that you should do is developing a Database Security Plan As a new database administrator, the primary thing which we should do is to secure it from illegal and wrong access. Yet, the security of the database is considered just a sub-module of the entire computer security analysis. In this scenario, the limitations are obviously described along with reliable direction given to everyone working inside the corporation. Additionally, in a security plan declarations provide a way to guarantee that every worker recognizes the limitations and their consequences thereafter. In addition, ...
3 Pages (750 words) Essay

Database Security

...Database Security Controls... Database Security Controls... Database Security Shakeel [Pick the Introduction As more and more increase in information day by day which results in increase in data, this data is stored on more and more database systems which are usually distributed. Big and medium businesses are susceptible to security breaches from outside which might compromise their competitive advantage. For the security breaches within data transfer, different encryption techniques are employed for the safe data travel but the data connecting to database servers must be subjected to policies and mechanisms to protect it from vulnerabilities. A broad spectrum of information security controls is employed on the database servers to protect it from ...
4 Pages (1000 words) Essay

Database security issues

...Database Security Controls... Database Security Controls... Security Issues Hellion Craig World There has been a tremendous increase in data in the last decade and the trend is poised to continue. Databases having become more critical in the delivery of the enterprise promise. However, with the growth in database systems’ demand, security issues concerning the safety of the data stored has become a vital issue. This paper seeks to discuss some of the database security issues that are threaten to compromise the information stored by organizations. There has been a rapid growth uptake of cloud computing and hence database systems that are web based face even more security threats. The paper analyzes security issues concerning both web based and...
5 Pages (1250 words) Research Paper

Security Controls - Kerberos

...Database Security Controls... Database Security Controls... System Kerberos System Kerberos is an authentication system or protocol created or developed by Massachusetts Institute of Technology (MIT) and adopted by most operating systems today. A basic knowledge of Kerberos is required to determine its usefulness in access control mechanisms provided by the operating system. Kerberos authentication process depends on certain formatted information or data packets referred to as tickets. The tickets are very vital in that they go via the networks rather than passwords. Conveying tickets rather than passwords makes the process of authentication resistant to threats or attacks that can intercept the network traffic (Brenner, 2008). In the Kerberos m...
1 Pages (250 words) Research Paper

Database Security

...Database Security Controls... Database Security Controls... Security Database Security Introduction A database can be described as a compilation of logically consistent data that bears inherent meaning. Data bases are designed and populated with data that relates to a specific purpose and an interaction with the events of the real world and active audiences interested in the contents (Shekhar & Chawla, 2003). They are designed to operate large amounts of information by capturing, storing, managing and retrieving that information. Computerized databases are created and maintained by database management systems (DBMS) or a collection of application programs specifically written for that purpose. The DBMSs provide an interface that that enables...
12 Pages (3000 words) Coursework

Interfaces, Database Integration, and Controls

...Database Security Controls... Database Security Controls... database integration, and controls management affiliation Interfaces, database integration, and controls management A boundary through which different constituents of the computer system can exchange data can be referred to as an interface. It can be among hardware’s, Software’s, peripheral devices and human beings. Interfaces can be divided into numerous types starting with the hardware interfaces, software interface and lastly the user interfaces. Hardware interfaces are the logical, mechanical and electrical signals within the interface and the procedure for classifying them at times known as signalling. This hardware interfaces are present in multiple components such as input output ...
2 Pages (500 words) Essay

Database security

...Database Security Controls... Database Security Controls... Database Security and Privacy Principles Personal information (PI) could be gathered, held, and used for many different purposes and through different methods. Once information has been collected, various legal and ethical issues govern the right for access to such information. Some information is deemed to be confidential and this means that third parties may not acquire it legally (Doyle & Bagaric, 2005). Several laws relating to database security and privacy have been promulgated in different countries across the world. Database security entails the protection of collected information. If this is not done, then databases are subjected to several threats that could lead to loss of...
1 Pages (250 words) Essay

Controls for Information Security

...Database Security Controls... Database Security Controls... for Information Security How Information Security Affects Information Systems Reliability According to Romney, et al (2012), information Security affects information systems reliability by ensuring that malicious threats do not cause downtime. Users require accurate, comprehensive and timely data that the information security must protect from loss or theft by third parties (Romney, et al, 2012). This implies that an organization wants an information system that is reliable to produce the intended functions. The other way that information security affects information systems reliability is the protection against data failure (Romney, et al, 2012). It is evident that data failures can lead...
2 Pages (500 words) Essay

Yahoo's Database Security

...Database Security Controls... Database Security Controls... Database Security Introduction Yahoo is currently one of the major e-mail providers. It has users across the globe. However, it only began as an idea and hobby by David Filo and Jerry Yang, who at that time were Ph.D students at the Stanford University (An Introduction to Yahoo, 2015). Their primary objective was to keep records of their interests on the internet. In 1994, these two developers decided to customize Yahoo into a database that could serve quite a number of users through an online platform, precisely the internet (An Introduction to Yahoo, 2015). From that time, Yahoo gradually gained popularity all over the world. Today, users get to access it quickly via typing a simple...
6 Pages (1500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Literature review on topic Database Security Controls for FREE!

Contact Us