Preview

Nt1330 Unit 1 Assignment

Powerful Essays
Open Document
Open Document
2207 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 1 Assignment
Database Security
Wilmington University

Table of Contents

Table of Contents 2
Abstract 3
Database Security 4
Physical Security 4
Security threats to Database 4
Numerous layers and data security controls are related to databases as follows 7
Assessments of vulnerabilities and Compliance 8
Conclusion 11
References 12

Abstract
This paper gives an idea regarding the important aspects of the database security. It mainly focuses on the security parameters such as confidentiality, authenticity and availability of the data. It also explains the different threats for the security in an organization in relation to the database. The basic steps which are required to control the loss of data are explained in detail. Among the controls the encryption process is the one which has to be followed to control the access into an
…show more content…
They may even share their login id and password with others. It is better if the IT members create software which asks certain questions before they log into the data.
Stage Vulnerabilities
Vulnerabilities in the computers may be due the unauthorized access of the person to corrupt the information in the system related to the database, some may also format the databases where upon usage they can easily hack the information. For example, the Blaster Worm abused a Windows 2000 feebleness to make foreswearing of association conditions.
Induction
Undoubtedly in secure DBMS, it is feasible for clients to draw gatherings from the data they get from the database. The employee working in an organization when gets certain information they may try to elaborate it or draw some important aspects related to the database from past. There are two crucial events of the finding issue, which ordinarily climb in database systems.
SQL

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 1 Assignment

    • 361 Words
    • 2 Pages

    According to the standard account, true belief is not sufficient for knowledge. It states that knowledge requires, not only that our beliefs be true, but that we have good reasons for believing them to be true. In standard account, knowledge is justified true belief.…

    • 361 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Good Essays

    | Keep information secure and manage personal access to information sources securelyProtect systems and data: Access controls: Physical controls: log-in details should be treated as credit card information and not to be left lying anywhere with an easy access, locks, passwords, access levels.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Sidpers

    • 2831 Words
    • 12 Pages

    Afyouni, Hassan, Database Security and Auditing, Protecting Data Integrity and Accessibility, 2006 Thomson Course Technology…

    • 2831 Words
    • 12 Pages
    Best Essays
  • Powerful Essays

    A database is a means of storing information in such a way that information can be retrieved from it. Thus a database is typically a repository for heterogeneous but interrelated pieces of information. Often a database contains more than one table. Codebooks and dictionaries can also be considered as tables. A dictionary is a reference book on any subject, the items of which are arranged in alphabetical order. Codebook is a list of replacements for words or phrases in the original message. A code is a system for hiding the meaning of a message by replacing each word or phrase in the original message with another character or set of characters. The list of replacements is contained in a codebook. An alternative definition of a code is any form of encryption which has no builtin flexibility, i.e. there is only one key, namely the codebook. Databases contain organized data. A database can be as simple as a flat file (a single computer file with data usually in a tabular form) containing names and telephone numbers of one’s friends, or as elaborate as the worldwide reservation system of a major airline. There are many ways to approach the design of a database and tables. The database layout is the most important part of an information system. The more design and thought put into a database, the better the database will be in the long run. We should gather information about the user’s requirement, data objects, and data definitions before creating a database layout. Traditionally, there are four different DBMS data models: the hierarchical data model, the network data model, the relational data model, and the objectoriented data model.…

    • 2737 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Many companies keep sensitive personal information about customers or employees in their files or on their network. Those information move fast through the systems and make easier for organizations to provide efficient and effect full service to the customers. Security of the information is one of the most concern aspects in information systems as it has become a major threat embedded with the information systems today. Having a sound security plan in place to collect only what you need, keep it safe, and dispose of it securely can help you meet your legal obligations to protect that sensitive data. In this article, it describes the data security, data breaches and as well as the existing solutions for prevent the security issues and vulnerabilities.…

    • 1700 Words
    • 6 Pages
    Better Essays
  • Best Essays

    Databases are used widely in our life. Because of databases, vast amounts of data have become easier to use and manage. Government, finance, operators, public security, energy, taxation, business, social security, transportation, health, education, e-commerce and corporate sectors have all set up their own database application systems in order to keep tremendous amounts of data in the database to manage and use, leading society into the information era. Meanwhile, with the development of the internet, databases play an even more import role, as they are invoked in website design and network marketing, including inquiries or information gathering of products, Press Releases, etc.…

    • 2529 Words
    • 11 Pages
    Best Essays
  • Powerful Essays

    Database Security

    • 7064 Words
    • 29 Pages

    Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The…

    • 7064 Words
    • 29 Pages
    Powerful Essays
  • Good Essays

    2. There must be strong encryption at the core of the database defense system. Better programmers can be hired to create the encryption and also hackers can be paid to test the system’s reliability.…

    • 569 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Many researchers have been concerned about the security of sensitive data. There are a lot of improvement and evolution of technologies in internal auditing. First of all, sensitive data is information that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization.…

    • 1728 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Database Technology

    • 576 Words
    • 3 Pages

    Objectives of the course: • This course aims to provide continuum to where the first course of databases left off. Design aspects of relational databases are covered. • Complex data models like OO OR parallel and distributed are introduced. • The course provides students a good overview of the ideas and the techniques, which are behind recent developments in the fields of data warehousing and Online Analytical Processing (OLAP). 1. Overview Review of relational database systems, ER diagram, SQL. 2. Integrity and Security Domain constraints; referential integrity, assertions; triggers; triggers and Assertions in SQL. Security and Authorization; Authorization in SQL. 3. Relational Database Design First Normal form; pitfalls in relational database design, functional dependencies; decomposition. Desirable properties of decomposition. Boyce – Code normal form; 3rd and 4th normal form. Mention of other normal forms. 4. The ER Model Revisited Motivation for complex data types, User Defined Abstract Data Types And Structured Types, Subclasses, Super classes, Inheritance, Specialization and Generalization, Relationship Types of Degree Higher Than Two. 5. Object-Oriented & Object relational databases Object Identity, Object Structure, and Type Constructors, Encapsulation of Operations, Methods, and Persistence, Type Hierarchies and Inheritance, Type extents and Queries, Database Design For An ORDBMS - Nested Relations and Collections; Storage And Access methods, Overview of SQL3. 6. Parallel and Distributed Databases Parallel Query Evaluation; Parallelizing Individual Operations, Sorting, Joins; Distributed Database Concepts, Data Fragmentation, Replication, and Allocation techniques for Distributed Database Design; Query Processing in Distributed Databases;…

    • 576 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Course Code: Course Objectives The course aims to provide students with an understanding of database concepts and design. It covers database design issues, such as security, integrity, recovery and concurrency. Distributed database, object-oriented database and data mining and data warehousing concepts will also be introduced. Intended Learning Outcomes of the Course On completion of the course, students should be able to: ILO1. explain the fundamental components and functions of a database management systems; ILO2. describe the characteristics of relational databases and the different types of database; ILO3. apply the database normalisation techniques and entity-relationship diagram in database design stage; ILO4. describe the main tasks performed by a database administrator; ILO5. apply basic SQL programming in creating, manipulating and removing items inside database table; ILO6. describe basic tools and techniques used for data warehouse and data-mining. Syllabus 1. 2. 3. 4. 5. 6. 7. 8. 9. Introduction to database Organisation, storage, and retrieval of large bodies of uniform or structured data Common database applications Introduction to relational databases, object-oriented databases, and distributed databases Entity-Relationship modelling Normalisation up to 3rd Normal Form Relation database design concepts Database creation, manipulation and maintenance Data mining and data warehousing C C 6 6 2 2 4 0 0…

    • 2413 Words
    • 10 Pages
    Satisfactory Essays
  • Better Essays

    Monitoring System

    • 758 Words
    • 4 Pages

    The database is designed for use by owner and other authorized user in the company to enable them to easily produce information required by the different people.…

    • 758 Words
    • 4 Pages
    Better Essays
  • Good Essays

    This study aims to develop an automated Enrollment System for King’s College. Secured, faster and more accurate enrollment of the student’s by encoding the information using the database.…

    • 382 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    ➢ Schema defines various views of the database for the use of various system components of the database management system and for the application’s security.…

    • 1915 Words
    • 8 Pages
    Powerful Essays