We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

The Security Risks Associated with online access to database. The common mistakes made by database administrators, security personal, and the application developers - Article Example

Comments (0)
Summary
When databases are linked to web front-ends to make the data accessible online, they become even more vulnerable. This is a failure in prioritizing security (over reliability), which…
Download full paper
GRAB THE BEST PAPER
The Security Risks Associated with online access to database. The common mistakes made by database administrators, security personal, and the application developers
Read TextPreview

Extract of sample
The Security Risks Associated with online access to database. The common mistakes made by database administrators, security personal, and the application developers

Download file to see previous pages... This leads to only minimal security if any, despite regulations requiring organizations to secure their data (Chickowski, 2009-8). Further complicating factors are the complexity of large databases, and the heterogeneity of the modern database environment (Chickowski, 2009-6). Thus, Chickowski (2009-9) also recommends an education program to teach users about database security, and highlights the importance of good password management.
Patches are infrequently applied because of the concept that if something is not broken, it doesn’t need to be fixed. Other areas of neglect are poor configuration management such as taking shortcuts, using test databases on production servers, etc. The latter especially leads to even further risks (Chickowski, 2009-8). These and other security lapses make databases vulnerable from worms, automated scanners, etc. Online databases can suffer from buffer overruns and the URLs “allow attacker code to be executed, and generally wreak havoc” (Chickowski, 2009-6). As for the application design itself, experts have even identified the most risky packages such as DBMS_SQL, UTL_TCP and DBMS_XMLGEN within Oracle, and third party applications can also undermine databases (Chickowski, 2009-8).
Simple and expected measures for security are authentication, authorization, and access control. Apart from configuration and patches, more advanced measures are encryption, auditing, monitoring, and data masking essential for enterprise databases. Besides these, other technological solutions are ‘hardening’ the database using features provided by the database vendor, and keeping out non-essential items from the server, including documentation, sample configurations, code files and if possible built-in stored procedures that are unused. Anything else that cannot be deleted should be disabled instead.
The relationship between databases and web applications are based on trust but ...Download file to see next pagesRead More
Comments (0)
Click to create a comment or rate a document
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Cyber crime and security affair in e-business
This research will try to answer the following questions: Whether cybercrime is a threat to E Commerce and online shopping? What are the damages done recently by cyber criminals and what are the costs of prevention? What are the new trends in Cybercrimes? Impact of Cloud computing on E commerce and Cybercrime? How computers of home users are affected by Cybercrimes?
24 Pages(6000 words)Article
Network Security And Management
A fault management console allows a'network administrator'or'system operator'to monitor events from multiple systems and perform actions based on this information. Ideally, a fault management system should be able to correctly identify events and automatically take action, either launching a program or script to take corrective action, or activating notification software that allows a human to take proper intervention (i.e.
3 Pages(750 words)Article
Internet Security Article
Because of internet, there are many global internet security concerns. Global internet security is a concern for all the world because due to internet, where people have gained many benefits, there are also many disadvantages such as internet fraud, loss of security and privacy, virus attacks, spamming, threat to data protection and computer misuse.
1 Pages(250 words)Article
Summary on Asian Security Class
This situation is among the major effects that the end of the cold war has brought forth to this nation. North Korea enjoyed much prosperity and was indeed more economically
1 Pages(250 words)Article
Asian security class: summary
According to Gobarvech, the relations between North Korea and Russia express all that was wrong with the Soviet Union policy (Kim and Lee 140). The relations were further worsened by the collapse of the USSR.
1 Pages(250 words)Article
Game to Learn IT Security Crime
This article explained motives of the creators - Laura Rosas and Wil Phelps and real life security scenarios within healthcare facilities, that were used in this game. The program, called, CyberSecure, is designed to use the in-game avatars to simulate and safely test and improve the outcomes of the staff as a whole.
1 Pages(250 words)Article
Database Logic and Management questions Module 2
In this scenario, (Craven, 2001) discuss some of the major advantages and disadvantages of E-R modeling which are outlined below: Without a doubt, logical design is the most manual and time consuming portion of the system
2 Pages(500 words)Article
Database Design Proposal
The proposal is being carried out to come up with an easy-to-use, fast, secure and reliable system to safeguard health information in the organization. The author of this research also proposes a system that is cheap to design and easy to maintain. The tool used for the database management will be SQL.
3 Pages(750 words)Article
SECURITY OF EHR
Tejero and De La Torre assert that the use of electronic health records has been on the rise especially since medical agencies started implementing digital solutions into their platforms. The authors point out that electronic health records (EHRs) are part of the
1 Pages(250 words)Article
Security awareness
Threats have continued to emerge from within the company due to inadequate awareness on issues targeting security among the workers in the company. Organizing a
1 Pages(250 words)Article
Let us find you another Article on topic The Security Risks Associated with online access to database. The common mistakes made by database administrators, security personal, and the application developers for FREE!
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us