Preview

Security Issues with Databases by Jing Ji

Best Essays
Open Document
Open Document
2529 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Issues with Databases by Jing Ji
Security Issues with Databases

by

Jing Ji

David Maccarone
Sheng Mao
Security Issues with Databases

1. Current state of database security

A database is a system that is specialized to manage data in a computer application system. Data has many forms, such as text, digital, symbols, graphics, images and sound. The database systems are integral components of current and future command, communication, control and intelligence information systems. (Lunt, 1992, p. 253) Databases are used widely in our life. Because of databases, vast amounts of data have become easier to use and manage. Government, finance, operators, public security, energy, taxation, business, social security, transportation, health, education, e-commerce and corporate sectors have all set up their own database application systems in order to keep tremendous amounts of data in the database to manage and use, leading society into the information era. Meanwhile, with the development of the internet, databases play an even more import role, as they are invoked in website design and network marketing, including inquiries or information gathering of products, Press Releases, etc. However, information technology is a double-edged sword. While bringing about social progress and development, it also brings a lot of potential safety hazards. For databases, the potential safety hazards are great, due to its ubiquity, as can be seen in the various situations where database security incidents happen. Examples are: a systems development engineer invades the mobile central database via the Internet to steal prepaid cards; a hospital database system is illegally invaded, resulting in tens of thousands of patients’ privacy information being stolen; a DBA in a game-design company modifies the data illegally in the database to steal game cards; hackers use SQL injection attacks, invading a database center of anti-virus software to steal a large amount of confidential information, leading



Bibliography: Chen, Ke, Chen, Gang, and Dong, Jinxiang. (2005). An Immunity-Based Intrusion Detection Solution for Database Systems. In Wenfei Fan, Zhaohui Wu, Jun Yang (Eds.), Advances in Web-Age Information Management (pp. 773-778). New York: Springer-Verlag. Clarke, Justin (2009). SQL Injection Attacks and Defense. Burlington, MA: Syngress. Li, Yingjiu, Guo, Huiping, and Wang, Shuhong. (2008). A Multiple-Bits Watermark for Relational Data. Journal of Database Management, 19(3), 1-21. Retrieved from Computer Database (http://proxy.nss.udel.edu:2104/gtx/start.do?prodId=CDB&userGroupName=udel_main) Lunt, Teresa F. (Ed.) (1992). Research Directions in Database Security. New York: Springer-Verlag. Natan, Ron Ben (2005). Implementing Database Security and Auditing. New York: Elsevier Digital Press. Oltsik, Jon (2009). Databases at Risk. Wilson, Rick L. and Rosen, Peter A. (2003). Protecting Data Through ‘Perturbation’ Techniques: The Impact on Knowledge Discovery in Databases. Journal of Database Management, 14(2), 14-26. Retrieved from Computer Database (http://proxy.nss.udel.edu:2104/gtx/start.do?prodId=CDB&userGroupName=udel_main) Prepared according to the APA Style. ----------------------- [1] Most of these came from Oltsik, 2009, p.4.

You May Also Find These Documents Helpful

  • Good Essays

    Database administrators should monitor their SQL databases for unauthorized or abnormal SQL injections and write scripts for alarming as well as Simple Network Management Protocol (SNMP) alerts. Additional safeguards can be placed that include encrypting the data elements that reside in long-term storage of the SQL…

    • 575 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    This paper gives an idea regarding the important aspects of the database security. It mainly focuses on the security parameters such as confidentiality, authenticity and availability of the data. It also explains the different threats for the security in an organization in relation to the database. The basic steps which are required to control the loss of data are explained in detail. Among the controls the encryption process is the one which has to be followed to control the access into an…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Cis 515week 3

    • 1024 Words
    • 4 Pages

    Bibliography: (2012). Database systems: Design, implementation, and management. (10 ed.). United States of America: Joe Sabatino.…

    • 1024 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Assignment

    • 533 Words
    • 3 Pages

    Organizations are under increased pressure to audit every action that a user performs within a database. This is due to increased focus on security, risk, accountability and avoidance of fraud and corruption. While security prevention measures (logins, firewalls, tokens etc.) are important to prevent unauthorized access to the data in the first place, as this survey shows, most breaches occur by users who are authorized but are either negligent or malicious.…

    • 533 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 18 - Database P1, M1

    • 995 Words
    • 4 Pages

    Every database management system should have these feature to protect and ensure the data is safe and accuracy.…

    • 995 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    The team began to consider how to prioritize security for the RDBMS to function. The RDBMS should be designed in a way that can offer security and protection to every piece of data saved within the architecture. This is crucial in assuring that the business remains competitive and meets client/customer confidence that sensitive data will not be exposed. These expectations could be meet only if users are sure that information being shared has not been altered or breached.…

    • 1329 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    Rob, P., & Coronel, C. (2002). Database systems: design, implementation, and management (5th ed.). Boston, MA: Course Technology.…

    • 1383 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    Dbm/380 Database Concepts

    • 461 Words
    • 2 Pages

    A database is a set of programs and applications used to store data, this allows the data to be used by different individuals in different areas and access information from it quickly. A database stores the information so it can be used at a later time so additional information can be added, taken away, or used as needed. Once in the database the data is compressed so it takes up less space in the computer’s memory. The database allows those authorized to use the data within it and control the creation, maintenance, and use of a database. A database stores various kinds of files, data records, and other objects. There are a variety of database models; there is the relational model or object model, which supports applications. That use query languages, which are high-level programming languages, and dedicated database languages that simplify writing database application programs. The main function of a database is basically retrieving and presenting information it controls, in doing this it allows the users data access, protects the data’s and makes it more manageable. It also provides safety features for the data so that it is not lost or misplaced and if there is a serious event or natural disaster, fire, etc. it can be recovered and restored from a backup. In my work we use Microsoft Access as a relational database for employment records and to store our client information such as names, addresses, phone numbers, and email addresses from this database we send out a monthly newsletter with special offers on services and products. By using a database, an organization saves time and money because it is only a few simple steps and we can email all of our clients and customers a monthly newsletter which informs them about what is happening within the organization, services and products we offer, and what is on sale which generates more business. By using a…

    • 461 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett…

    • 299 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Sidpers

    • 2831 Words
    • 12 Pages

    Afyouni, Hassan, Database Security and Auditing, Protecting Data Integrity and Accessibility, 2006 Thomson Course Technology…

    • 2831 Words
    • 12 Pages
    Best Essays
  • Good Essays

    References: Pratt, P.J, & Adamski J.J, (2011). Concepts of Database Management. Ohio, OH: CENGAGE Learning.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Database Environment

    • 1121 Words
    • 5 Pages

    A database defines a structure for storing information and it collects information that is organized in such a way that a computer program can quickly select desired pieces of data. A database can also be thought of as an electronic filing system. Data and information are extracted from a database by creating a query and then submitting it to the query database management system (DBMS) and it is posed in a language that only the DBMS can understand. The query can be in the form of a question or just a keyword and once these queries run against the database, it will find a matching record (Reynolds, 2004) .…

    • 1121 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Examination Checker

    • 506 Words
    • 3 Pages

    People use computers to store unbelievably large qualities of information which is called database. The efficiency with which the computers store and retrieve information makes them valuable in a wide range of profession.…

    • 506 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Online Voting System

    • 1505 Words
    • 7 Pages

    This chapter discusses the literature and studies which are related and have direct bearing to the proposed study. It consists of referenced information about information system, Sales Monitoring and Inventory System, scripting and programming languages, database, online application and web authentication security. And will also discuss the synthesis of the proposed study.…

    • 1505 Words
    • 7 Pages
    Powerful Essays