Preview

it255

Better Essays
Open Document
Open Document
721 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
it255
Encryption a Means of Security

Seminar Presentation

On

Application of encrypting techniques

In

Database Security

By

Uweh SKelvin

ABSTRACT

Security in today’s world is one of the important challenges that people are facing all over the world in every aspect of their lives. Similarly security in electronic world has a great significance. In this seminar work, we discuss the applications of encryption techniques in database security. This is an area of substantial interest in database because we know that, the use of database is becoming very important in today’s enterprise and databases contains information that is major enterprise asset. This research work discuses the application of various encryption techniques in database security, and how encryption is used at different levels to provide the security.

1. INTRODUCTION

Information or data is a valuable asset in any organization. Almost all organization, whether social, governmental, educational etc., have now automated their information systems and other operational functions. They have maintained the databases that contain the crucial information. So database security is a serious concern. To go further, we shall first discuss what actually the database security is?

Protecting the confidential/sensitive data stored in a repository is actually the database security. It deals with making database secure from any form of illegal access or threat at any level. Database security demands permitting or prohibiting user actions on the database and the objects inside it. Organizations that are running successfully demand the confidentiality of their database. They do not allow the unauthorized access to their data/information. And they also demand the assurance that their data is protected against any malicious or accidental modification. Data protection and confidentiality are the security concerns. Figure 1 below shows

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS3350 week 1

    • 287 Words
    • 3 Pages

    9. Security controls and security countermeasures to help protect the Master SQL Database that houses customer privacy data and intellectual property assets.…

    • 287 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Database administrators should monitor their SQL databases for unauthorized or abnormal SQL injections and write scripts for alarming as well as Simple Network Management Protocol (SNMP) alerts. Additional safeguards can be placed that include encrypting the data elements that reside in long-term storage of the SQL…

    • 575 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    PT2520

    • 1263 Words
    • 7 Pages

    The course project is based on the Westlake Research Hospital scenario that you have been studying throughout the course and uses the Westlake database you used for the Group A labs. To complete the project, you will need to use your copy of the SQL2008ExpVM virtual machine, as it existed at the end of the last unit (Unit 9). Your instructor will provide you with a script file named ProjectLoadData.sql, which you will use to populate the database. You will receive instructions on how to use this file in Step 10 of the Technical Steps section of this lab.…

    • 1263 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    • Describe the basic framework or make-up of any database. Discuss what makes databases important as well as a major target to hackers.…

    • 392 Words
    • 2 Pages
    Good Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    This paper gives an idea regarding the important aspects of the database security. It mainly focuses on the security parameters such as confidentiality, authenticity and availability of the data. It also explains the different threats for the security in an organization in relation to the database. The basic steps which are required to control the loss of data are explained in detail. Among the controls the encryption process is the one which has to be followed to control the access into an…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    IS305

    • 300 Words
    • 2 Pages

    1. Nessus is a vulnerability scanner whereas NMAP is used for mapping a network’s hosts and the hosts’ open ports. Administrators log into the Nessus interface and set up policies, scans and view reports and they use NMAP to primarily detect what hosts are on the network.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A(n) relational database management system provides protection for your data through the use of security, control, and recovery facilities. _________________________…

    • 585 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It250

    • 272 Words
    • 2 Pages

    Which of the following symbols instructs the shell to redirect the output of a command to the specified file instead of the screen and overwrite the file?…

    • 272 Words
    • 2 Pages
    Good Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Ha255

    • 767 Words
    • 4 Pages

    Five key elements should be considered when preparing a compensation plan for an organization. They five key elements include the forms of compensation that will be or can be offered, workforce demographics, the business cycle, the compensation philosophy, and legal and regulatory compliance. The forms of compensation has two forms that can be offered direct and indirect compensation. Direct compensation is all tangible rewards of the working relationship, that is, the sum of base pay plus variable pay (Locke, Jones, & Graham, 2010). Pay received in the form of services and benefits is called indirect compensation (Locke, Jones, & Graham, 2010). The product the organization offers the marketplace is the workforce of any service organization. In the business cycle it is critical for top management and HR professionals to match the compensation practices with what the organization is trying to accomplish (Locke, Jones, & Graham, 2010). the compensation philosophy is considered because organization want to pay to wages like their competitor 's but this might not be possible, therefore three approaches for compensation can be taken into consideration which are market-based pay, competency-based pay, and team-based pay (Locke, Jones, & graham, 2010). When managing compensation systems organizations must follow federal, state, and local regulations and reporting requirements. Some of these important regulations are minimum wage standards and hours worked (Locke, Jones, & Graham, 2010).…

    • 767 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Dbm 381 Week 1paper

    • 885 Words
    • 4 Pages

    A database is a structure that can store information about multiple types of entities, the attributes of those entities, and the relationships between the entities (Pratt & Adamski, 2012, Chapter 1). How data is received, stored, processed, and made available to others has an effect on the success or failure of an organization. The use of different architecture is a most to fit the needs of the organization, however the value of the data still remains in been able to access and extract information from the database system, and the only way this can be reached is by organizing, storing, and analyzing it effectively. For many organizations these systems have become an essential part of their structural and operational success.…

    • 885 Words
    • 4 Pages
    Good Essays
  • Good Essays

    geog257

    • 1973 Words
    • 8 Pages

    Quite often, environmental issues are discussed in terms of economic, political and/or social implications. Ethical issues, fundamental to the topic, are usually ignored. Failure to consider these issues is often understandable when the nature of pragmatic politics and economics is understood. Ethical positions are most often phrased as questions asking how we, as humans, relate to other humans individually, to other humans as groups, to other humans still to be born, to other forms of life and/or to entire sets ranging from ecosystems to the entire planet. Questions as to humans’ relations with nature are often raised as well as the relationship between technology and progress – for example, are gains from technological innovations mainly accrued by the wealthy and often at the expense of poor or dispossessed peoples? To what extent do technological innovations generate serious social and ecological problems? Is progress in meeting human needs always at the expense of nature? Is the biotechnology revolution in agriculture in the best interest of both humanity and nature? Questions such as these will be dealt with as our course proceeds during the semester.…

    • 1973 Words
    • 8 Pages
    Good Essays
  • Good Essays

    It/235

    • 1117 Words
    • 5 Pages

    As professional photographers you would receive many requests for free images on a regular basis. In a perfect world, each of us would love to be able to respond in a positive manner and assist, especially with projects or efforts related to areas such as education, social issues, and conservation of natural resources. To a photographer creating compelling images is the way they make their living. If they were give away their images for free, or spend too much time responding to requests for free images, they would and could not make a living.…

    • 1117 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    CU2546

    • 427 Words
    • 2 Pages

    1.1 – The difference between a working relationship and a personal relationship is how people act towards each other. There are certain types of affection that are unacceptable in a working relationship, for example kissing, hugging wearing inappropriate clothing and sexual verbal gestures. A working relationship involves specific objectives and purpose, clear boundaries, professional codes of conduct, policies and procedures and time limits.…

    • 427 Words
    • 2 Pages
    Satisfactory Essays