Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Database security issues - Research Paper Example

Comments (0) Cite this document
Databases having become more critical in the delivery of the enterprise promise. However, with the growth in database systems’ demand, security issues concerning the safety of…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.5% of users find it useful
Database security issues
Read TextPreview

Extract of sample "Database security issues"

Download file to see previous pages The paper analyzes security issues concerning both web based and traditional databases.
Database inference is a security issue that multi level databases are prone to. Inference can be defined as the process in which a user can infer restricted information from results of queries. Typically, inference occurs when a user at a lower security level is able to put together trivial information accessible at that level to deduce a fact that requires a higher security clearance to access. To be able to access the higher security level information, a user may exploit correlated data. If for instance a user can access the values of H and K, then for a case whereby Z=H*K, the user can correctly infer the value Z even without security clearance. Another inference channel is missing data. When a user receives null values when querying certain fields, the restricted information can be inferred. A practical example is when a user cannot slot in a booking and yet the space is not yet reserved. Through cross-referencing, it can be known that some record is already stored in the given field. Another aspect of the inference problem is caused by value constraints. For example if attribute Y is not classified and X is secret with the constraint X+Y>100, the value of X can be inferred through a query. A technique to remedy the inference problem is through polyinstantiation. This is a relationship whereby elements of a given attribute are associated but have multiple independent instances of instantiation. This may end up creating a new problem of double records in the long run. According to Natan (2003), “the entries may result in major problems if the database is for mission critical systems like airliners.”
The other security issue is SQL Injection. This refers to a scenario whereby unauthorized MySQL statement is run on a database. This technique takes advantage of un-validated user input vulnerability to pass commands from a web ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Database security issues Research Paper Example | Topics and Well Written Essays - 1250 words”, n.d.)
Database security issues Research Paper Example | Topics and Well Written Essays - 1250 words. Retrieved from
(Database Security Issues Research Paper Example | Topics and Well Written Essays - 1250 Words)
Database Security Issues Research Paper Example | Topics and Well Written Essays - 1250 Words.
“Database Security Issues Research Paper Example | Topics and Well Written Essays - 1250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Database security issues

Methods for Database Security

...Database security has become one of the most important issues in today’s world of technology. This paper introduces the issue of database security in an organization by introducing the need and importance of database security. This is followed by a description of the main types of security threats that an organization would face, though the list is not conclusive. The main part of this paper discusses the ways that an organization can use to counter the threats identified in the previous parts of the paper. The methods to be used include data encryption, web-based data...
10 Pages(2500 words)Essay

Database and Enterprise Application Security

.... This paper will also discuss various issues those need to be considered by the organizations for the protection of business data and information. This paper will also present some of the basic aspects regarding DBMS system security concerns those need to considered and managed for the effective security management. Introduction Information security remains an extremely significant concern throughout system development life cycle. In other words, it is as imperative as the delivery of the overall system development according to functional requirement. Through the identification of problems and issues near the beginning in the project's...
7 Pages(1750 words)Essay

Database security Questions

...?DATABASE SECURITY QUESTIONS Database Security Questions Affiliation Q As a new Database Administrator, the first thing that you should do is developing a Database Security Plan As a new database administrator, the primary thing which we should do is to secure it from illegal and wrong access. Yet, the security of the database is considered just a sub-module of the entire computer security analysis. In this scenario, the limitations are obviously described along with reliable direction given to everyone working inside the corporation....
3 Pages(750 words)Essay

Database Security for Electronics Ltd

...157). The standard language that is used for making an interactive query from and, updating the databases as Microsoft SQL server is known as the Structure Query Language (SQL). This paper tries to analyze the potential issues that are arising from having a database server online. Securities in the software applications are very significant in all the organization that has databases. An SQL injection attack is one of the identified potential issues that might arise from having the databases online. SQL injection attack is a type of an attack that comes from what the user has inputted, and is not well checked to find if...
8 Pages(2000 words)Essay

Database Security

...? Database Security Shakeel [Pick the Introduction As more and more increase in information day by day which results in increase in data, this data is stored on more and more database systems which are usually distributed. Big and medium businesses are susceptible to security breaches from outside which might compromise their competitive advantage. For the security breaches within data transfer, different encryption techniques are employed for the safe data travel but the data connecting to database servers must be subjected to policies and mechanisms to protect it from vulnerabilities. A broad spectrum of information security controls is employed on the database servers to protect it from vulnerabilities to its confidentiality... ,...
4 Pages(1000 words)Essay

Explain database security issues

...College: Explain Database Security Issues What is Metadata? Metadata refers to the data used in of other data. Metadata illustrates the quality, content, condition, as well as other features concerning data inscribe in an ordinary FGDC layout. The role of metadata is helping individuals in locating, as well as understanding, data. It also offers the history of given data by describing the data’s structure and content, its generator and preserver, its time of collection and publication, its geographic or storage location, reason for its creation, and means of producing, processing, or modelling it (Cox et al, 2012). A Concurrent Update A concurrent update refers to the situation in...
2 Pages(500 words)Essay

Development of database security

...and in the future.” (Neilson and Parui, 2009) The database security is one of the non-functional requirements which would only be fulfilled after completing all the functional requirements of the database. One of the reasons for not implementing secured databases is the improper design that does not act in accordance to organizational security policies. This document presents the importance of database security and critically reviews the various reasons for improper security implementation. Moreover, the document provides comprehensive analysis of the techniques and strategies are being...
4 Pages(1000 words)Term Paper

Database Security

...with requests, resulting in the denial of service to authorized users. By bypassing authentication, attackers gain access as though they are valid users of the database and are able to use data they are not authorized to (Beaulieu, 2009). Middleware sitting between users and data also bring forth another category of security issues. When users are only required to provide a single sign during authentication, they are granted access to the entire system by only one password, but the risk is that when the password is stolen, all systems are endangered (Voorhees & Harman, 2005). Because most organizations own several types of databases, they hire the services of third...
12 Pages(3000 words)Research Paper

Interpretation of Statutes

8 Pages(2000 words)Essay

Database security

... Database Security and Privacy Principles Personal information (PI) could be gathered, held, and used for many different purposes and through different methods. Once information has been collected, various legal and ethical issues govern the right for access to such information. Some information is deemed to be confidential and this means that third parties may not acquire it legally (Doyle & Bagaric, 2005). Several laws relating to database security and privacy have been promulgated in different countries across the world. Database security entails the protection of collected information. If this is not done, then databases are subjected to several threats that could lead to loss of integrity, loss of availability, and loss... ). Privacy law...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Database security issues for FREE!

Contact Us