Preview

A Discussion of Some of the Nuances of Database Security

Powerful Essays
Open Document
Open Document
2857 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
A Discussion of Some of the Nuances of Database Security
STRAYER UNIVERSITY
CIS 512
Professor: Angela Gabriel

Advanced Data and Computer Architectures

A discussion of some of the nuances
Of
Database Security

James A. Wallace
June 09, 2006 ABSTRACT:
When it comes to the topic of database security head just do not turn the way benchmarking world records and reports of ever-shorter downtimes do. However, security breaches do turn heads as well as undermine customer confidence, as the well-publicized thefts of credit card numbers from a few e-businesses showed in 2000. Databases introduce a number of unique security requirements for their users and administrators. On one hand, databases are designed to promote open and flexible access to data. On the other hand, this same open access makes databases vulnerable to many kinds of malicious activity. Moreover, as more businesses participate in the e-space, it becomes particularly important to separate private from public data. Securing a database involves not only establishing a strong policy, but also establishing adequate access controls. In this paper, we will discuss several of the various nuances of Database security.

TABLE OF CONTENTS
I. INTRODUCTION
II. UNDERSTANDING VULNERABILITIES
A. VENDOR BUGS
B. POOR ARCHITECTURE
C. MISCONFIGURATIONS
D. INCORRECT USAGE
E. SERVER SECURITY
F. DATABASE CONNECTIONS
G. TABLE ACCESS CONTROL
III. WHO NEEDS ASSESS TO THE DATABASE?
IV. BASIC SECURITY STRUCTURE
V. LEVELS OF ACCESS
VI. PRIVILEGES
VII. SECURING A DATABASE INVOLVES
VIII. AUTHENTICATION
IX. SECURE SOCKET LAYERS
X. SUMMARY

INTRODUCTION

Security is a journey, not a destination. You should never assume that any product or technique is secure, because you cannot possibly know what new attacks will become possible in the future. One of the more recent evolutions in network security has been the movement away from protecting the perimeter of the network to protecting data at the source. The reason behind this change has



Cited: Coronel, Carolo and Rob, Peter, “Database systems: Design, implementation, & Management “Sixth edition: Boston, MA, Thompson, 2004 Plew, Ronald R. and Stephens, Ryan K., “Database Design”, Indianapolis, IN: Sams Publishing, 2001 APPLICATION SECURITY, INC. “Database Security A Key Component of Application Security” Wiedman, Blake “Database Security (Common-sense Principles)”, Government Security org. “Database security breaches on the increase” 7th August 2002

You May Also Find These Documents Helpful

  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cis 515week 3

    • 1024 Words
    • 4 Pages

    Bibliography: (2012). Database systems: Design, implementation, and management. (10 ed.). United States of America: Joe Sabatino.…

    • 1024 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    References: Rob, Peter and Coronel, Carlos. (2005). Database Systems: Design, Implementation, and Management. United States: Thomson Course Technology.…

    • 2376 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Cis 111

    • 790 Words
    • 4 Pages

    (2012). Database systems: Design, implementation, and management. (10 ed.). United States of America: Joe Sabatino.…

    • 790 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Sidpers

    • 2831 Words
    • 12 Pages

    Afyouni, Hassan, Database Security and Auditing, Protecting Data Integrity and Accessibility, 2006 Thomson Course Technology…

    • 2831 Words
    • 12 Pages
    Best Essays
  • Good Essays

    References: Coronel, C. (2013). Database Systems: Design, Implementation, and Management, Tenth Edition. Mason, Ohio, United States: Cengage Learning.…

    • 799 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Athabasca Assignment

    • 837 Words
    • 4 Pages

    Relational databases are not new technology. Commercially, they gained importance in the early 1980s with the introduction of Oracle’s relational database, and since then they have been an essential tool for most businesses. Databases are critical tools that help to support various business functions in an organization. These information systems help a business to build and maintain competitive advantage. Databases not only support the operational levels of business—they are also used to support the activities of managers.…

    • 837 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The particular motivation behind this paper is to portray the confirmation process and to portray how this and other data security contemplations will influence the configuration and advancement process for new data frameworks.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Week 3 iLab

    • 1035 Words
    • 6 Pages

    The last page of the lab assignment document contains a full-page topology. Remove this page and use it for reference to the topology and the IP addresses.…

    • 1035 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    References: Pratt, P.J, & Adamski J.J, (2011). Concepts of Database Management. Ohio, OH: CENGAGE Learning.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    research paper

    • 329 Words
    • 2 Pages

    Zemke, F. (2012, MARCH). What 's new in SQL:2011. Retrieved September 2012, from www.sigmod.org: http://www.sigmod.org/publications/sigmod-record/1203/pdfs/10.industry.zemke.pdf…

    • 329 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    One key advantage of a database management system is that it is secure. First and foremost on the minds of an organization is security. This type of system is managed through a DA (Database Administrator). This person sets limits on accessibility, which means not all employees, or customers can access all levels of information within the database. The first line of defense is to allow access to a computer only to authorized, trusted users and to authenticate those users by a password or similar mechanism (computer science. (2013). In Encyclopedia Britannica. Retrieved from http://www.britannica.com.libdatab.strayer.edu/EBchecked/topic/130675/computer-science).…

    • 864 Words
    • 4 Pages
    Better Essays
  • Better Essays

    it255

    • 721 Words
    • 3 Pages

    Information or data is a valuable asset in any organization. Almost all organization, whether social, governmental, educational etc., have now automated their information systems and other operational functions. They have maintained the databases that contain the crucial information. So database security is a serious concern. To go further, we shall first discuss what actually the database security is?…

    • 721 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Computer Security Issues

    • 1058 Words
    • 31 Pages

    First, the importance of the network security. With the informationization developing fast today, the computer network obtained the widespread application, but along with the network information transmission capacity growing faster, some organizations and departments benefit the speedup with the service operation in the network, while, the data has also suffered to extent attack and destruction. The aggressor may intercept the information in the network, steals the user’s password, the database information; also may tamper with the database content, the forge user’s status, denies own signature. And what is more, the aggressor may delete the database content, the destroy node, releases computer virus and so on. This cause data security and own benefit have received the serious threat.…

    • 1058 Words
    • 31 Pages
    Better Essays