Database Security

Topics: SQL, Database, Access control Pages: 23 (7064 words) Published: November 13, 2012
Journal of Information Technology Education:
Innovations in Practice

Volume 9, 2010

Database Security: What Students Need to Know
Meg Coffin Murray
Kennesaw State University, Kennesaw, GA, USA

Executive Summary
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical Implementation Guide, states that database security should provide controlled, protected access to the contents of a database as well as preserve the integrity, consistency, and overall quality of the data. Students in the computing disciplines must develop an understanding of the issues and challenges related to database security and must be able to identify possible solutions. At its core, database security strives to insure that only authenticated users perform authorized activities at authorized times. While database security incorporates a wide array of security topics, notwithstanding, physical security, network security, encryption and authentication, this paper focuses on the concepts and mechanisms particular to securing data. Within that context, database security encompasses three constructs: confidentiality or protection of data from unauthorized disclosure, integrity or prevention from unauthorized data access, and availability or the identification of and recovery from hardware and software errors or malicious activity resulting in the denial of data availability.

In the computing discipline curricula, database security is often included as a topic in an introductory database or introductory computer security course. This paper presents a set of sub-topics that might be included in a database security component of such a course. Mapping to the three constructs of data security, these topics include access control, application access, vulnerability, inference, and auditing mechanisms. Access control is the process by which rights and privileges are assigned to users and database objects. Application access addresses the need to assign appropriate access rights to external applications requiring a database connection. Vulnerability refers to weaknesses that allow malicious users to exploit resources. Inference refers to the use of legitimate data to infer unknown information without having rights to directly retrieve that information. Database auditing tracks database access and user activity providing a way to identify breaches that have occurred so that corrective action might be taken. Material published as part of this publication, either on-line or in print, is copyrighted by the Informing Science Institute. Permission to make digital or paper copy of part or all of these works for personal or classroom use is granted without fee

provided that the copies are not made or distributed for profit or commercial advantage AND that copies 1) bear this notice
in full and 2) give the full citation on the first page. It is permissible to abstract these works so long as credit is given. To copy in all other cases or to republish or to post on a server or to redistribute to lists requires specific permission and payment of a fee. Contact to request

redistribution permission.

As the knowledge base related to database security continues to grow, so do the challenges of effectively conveying
the material. This paper addresses those
challenges by incorporating a set of interactive software modules into each sub-topic. These modules are part of an
animated database courseware project
designed to support the teaching of database concepts. The courseware covers

Editor: Anthony Scime

Database Security: What Students Need to Know

the domains of...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Database Design: Notes Essay
  • database Essay
  • Database Security Issues Essay
  • Database Research Paper
  • It Security Essay
  • Essay about It Infrastructure Security Policy
  • Risk management
  • Distributed Databases Essay

Become a StudyMode Member

Sign Up - It's Free