StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Database Security - Threats and Challenges - Research Paper Example

Comments (0) Cite this document
Summary
In today’s world, data is a very valuable asset used by individuals as well as organizations. This paper is about database securities layers such as database administration, system administration, security office, developers and employees, about the problem of the provenance of data, ownership and IPR. Database information is vulnerable to many different attacks as will be seen in the paper…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.9% of users find it useful
Database Security - Threats and Challenges
Read TextPreview

Extract of sample "Database Security - Threats and Challenges"

Download file to see previous pages Database information is vulnerable to many different attacks as will be seen in the paper. However, the situation is not bleak as it is possible to reduce the risks by focusing on the threats that are most critical. This paper examines this claim and addresses the threats and challenges faced in databases that if organizations could adopt, they would comply with the requirements of most regulated industries in the world. This document focuses on database-specific protections.
In today’s world, data is a very valuable asset used by individuals as well as organizations. It is stored in a database to make it easy to retrieve and maintain. It is essential to secure data because attacks could prove detrimental to the organization or individual owning it. There are several database security layers such as database administration, system administration, security office, developers and employees. Security can be breached at any of these layers by an attacker (Burtescu 2).
Database security is becoming more and more challenging because the data concerns are evolving and amounts of data that is highly valuable are increasing. The internet has resulted in disintermediation of the access of data, which coupled with the democratization of computing has resulted in requirements for data access anywhere, anytime and anyhow, making its contribution to the increase of data security concerns. New computing paradigms and applications such as grid based computing and on-demand business are coming up together with security policies such as access control policies that are becoming complex with time (Burtescu 6).
Classical security concerns for databases are such as confidentiality that deals with availability of data only to subjects who are authorized, integrity that deals with the ability to modify data by subjects who are authorized only and availability that is all about the ability to retrieve the data whenever it is needed. Other data concerns are such as the quality and completeness of data.  ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Database Security - Threats and Challenges Research Paper Example | Topics and Well Written Essays - 3750 words, n.d.)
Database Security - Threats and Challenges Research Paper Example | Topics and Well Written Essays - 3750 words. https://studentshare.org/information-technology/1868471-database-security-threats-and-challenges
(Database Security - Threats and Challenges Research Paper Example | Topics and Well Written Essays - 3750 Words)
Database Security - Threats and Challenges Research Paper Example | Topics and Well Written Essays - 3750 Words. https://studentshare.org/information-technology/1868471-database-security-threats-and-challenges.
“Database Security - Threats and Challenges Research Paper Example | Topics and Well Written Essays - 3750 Words”. https://studentshare.org/information-technology/1868471-database-security-threats-and-challenges.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Database Security - Threats and Challenges

Threats to Global Security

...Database Security - Threats and Challenges... Database Security - Threats and Challenges... and Security in the Post-Cold War Global System: ‘Old and New Wars’. In discussing the difference between “old” wars and “new” wars in his essay “The Transformation of War,” Martin Van Creveld describes the “Clausewitzian” as the essential characteristic of the “old” view of war. (Van Creveld, 1991, p.ix) This view portrays “old” wars as characterized by WWI and WWII, where the entire globe was considered the battlefield for imperial powers, entire societies were industrialized for military production, the greatest advances in mass-production, science, and rationalization were used to create the most violent weapons of mass destruction the world had ever...
14 Pages(3500 words)Essay

Database Security

...Database Security - Threats and Challenges... Database Security - Threats and Challenges... Database Security Shakeel [Pick the Introduction As more and more increase in information day by day which results in increase in data, this data is stored on more and more database systems which are usually distributed. Big and medium businesses are susceptible to security breaches from outside which might compromise their competitive advantage. For the security breaches within data transfer, different encryption techniques are employed for the safe data travel but the data connecting to database servers must be subjected to policies and mechanisms to protect it from vulnerabilities. A broad spectrum of information security controls is employed on the...
4 Pages(1000 words)Essay

Security: Threats and Security Analysis

...Database Security - Threats and Challenges... Database Security - Threats and Challenges... Nuclear Disarmament Desirable and Feasible? Introduction When the Cold War was about to culminate, the world powers proclaimed a seemingly desirable, but somewhat impossible, vision—a world completely free from the threats of nuclear weapons. The value or purpose of nuclear weapons is rooted in global politics. Nuclear disarmament demands a collaborative model of international security. Cooperation between the power blocs is very important, as well as regional cooperation. Disarmament efforts should deal with the interests of developing nations and to the expectations, cynicism, and uncertainties of countries across the globe. To be successful, such...
10 Pages(2500 words)Essay

Security Threats in Louisiana

...Database Security - Threats and Challenges... Database Security - Threats and Challenges... Mall of Louisiana is one of the biggest commercial structures located in Bluebonnet Boulevard. With more than 175 retailers, the number of visitors and shoppers per day could be thousands. As identified in PSOS (2011), “on the day-to-day level, the most common threats come from clients, employees and suppliers. Potential terrorist or criminal acts pose a threat whose impact on human and material loss could be enormous” (par. 2). In this regard, the security system for the shopping mall should encompass the following areas: a preventative intelligence infrastructure; advanced technological means; security procedures; professionally trained personnel; and...
1 Pages(250 words)Term Paper

Database security issues

...Database Security - Threats and Challenges... Database Security - Threats and Challenges... Security Issues Hellion Craig World There has been a tremendous increase in data in the last decade and the trend is poised to continue. Databases having become more critical in the delivery of the enterprise promise. However, with the growth in database systems’ demand, security issues concerning the safety of the data stored has become a vital issue. This paper seeks to discuss some of the database security issues that are threaten to compromise the information stored by organizations. There has been a rapid growth uptake of cloud computing and hence database systems that are web based face even more security threats. The paper analyzes security issues...
5 Pages(1250 words)Research Paper

IT security threats

...Database Security - Threats and Challenges... Database Security - Threats and Challenges... security threats Affiliation: Discuss global IT security threats and potentialsolutions One of the threats to IT according to CERT (Computer Emergency Response Team) program is the insider threat (from employees, contractors or even business partners) since they are in a better position to access the information system of the organization without detection (http://www.cert.org/). The solutions to this are to enforce strict passwords and having account management practices as well as policies, responding quickly to suspicious and or disruptive behavior and especially on the information technology systems, enforcing stringent security access and controls and ...
1 Pages(250 words)Research Paper

Security Threats and Defenses

...Database Security - Threats and Challenges... Database Security - Threats and Challenges... threats and defenses Role of information system security The term social security in the context of organization is defined as the act in which, employees of an organization are manipulated by outsiders to rely key and confidential information details regarding an organization (Hadnagy, 2011). This information is sort by ill intentioned people for purposes of hacking computer systems or committing fraud. Social engineering is the newest form of crime in organizations and involves manipulation of the mind in hidden ways (Hadnagy, 2011). The successful operation of any organization is highly dependent on the performance of its work force. It is therefore the ...
2 Pages(500 words)Essay

Security Threats and Defenses

...Database Security - Threats and Challenges... Database Security - Threats and Challenges... Threats and Defenses Need for security measures. Social engineering has caught on among many professionals. The techniques in use are based on cognitive biases, which are attributes of man decision making. Social engineers are aiming at exploiting these biases by creating attack techniques. Consequently, every company is at a risk of being attack by one of the many techniques in use. Preparing employees to recognize and respond to social engineering techniques will at help to protect the company in many ways, which include: 1. Use strong passwords. By using strong passwords in the computer network, they will protect the company from against unauthorized ac...
1 Pages(250 words)Essay

Database Security

...Database Security - Threats and Challenges... Database Security - Threats and Challenges... Security Database Security Introduction A database can be described as a compilation of logically consistent data that bears inherent meaning. Data bases are designed and populated with data that relates to a specific purpose and an interaction with the events of the real world and active audiences interested in the contents (Shekhar & Chawla, 2003). They are designed to operate large amounts of information by capturing, storing, managing and retrieving that information. Computerized databases are created and maintained by database management systems (DBMS) or a collection of application programs specifically written for that purpose. The DBMSs provide an...
12 Pages(3000 words)Coursework

Database security

...Database Security - Threats and Challenges... Database Security - Threats and Challenges... Database Security and Privacy Principles Personal information (PI) could be gathered, held, and used for many different purposes and through different methods. Once information has been collected, various legal and ethical issues govern the right for access to such information. Some information is deemed to be confidential and this means that third parties may not acquire it legally (Doyle & Bagaric, 2005). Several laws relating to database security and privacy have been promulgated in different countries across the world. Database security entails the protection of collected information. If this is not done, then databases are subjected to several threats ...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Database Security - Threats and Challenges for FREE!

Contact Us