Preview

Comparative Study of Data Security in Some Database Management Systems

Powerful Essays
Open Document
Open Document
12325 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Comparative Study of Data Security in Some Database Management Systems
Comparative study of DATA SECURITY IN some database MANAGEMENT SYSTEMS

by

JiaLiang Mao

A Minor Thesis

Submitted in partial fulfillment of the requirements for the degree of

Master of Science in Computer Science

Supervisor:
Dr. Dat Dac Hoang

Victoria University – Sydney City Centre (October, 2012)
RCM6104,RCM6105

Abstract
Recently, database management systems (DBMSs) have become a main component of various kinds of dynamic web and applications. In these DBMSs, there might be stored some significant, sensitive and classified data. The developments of theory and technology in databases have become urgent needs for achieving database system security. Currently there are many DBMSs for users to choose. Therefore it becomes an important issue for people to decide how to choose a suitable database system. This thesis researches some mainstream database systems to compare their security performances, structures, security strategies.

Statement of Originality
I certify that this thesis contains no material which has been accepted for the award of any other degree or diploma in any institute, college or university, and that, to the best of my knowledge and belief, it contains no material previously published or written by another person, except where due references is made in the text of the thesis.

-----------------------------
JiaLiang Mao

October, 2012
Table of Contents

Abstract iii
Statement of Originality iv
Table of Contents v
List of Figures viii
List of Tables ix
Chapter 1 Introduction 1 1.1 Aim and Objectives 1 1.2 Thesis Organization 2
Chapter 2 Background 3 2.1 Comparison of a Variety of DBMSs 4 2.1.1 Microsoft SQL Server 2008 R2 4 2.1.2 MySQL 4 2.1.3 Oracle 11g 5 2.2 Control Access 6 2.2.1 Traditional Database System Access Control 7 2.2.2 Role-Based Access Control 8 2.2.3 Usage Control Access 8 2.3 Encryption 9 2.3.1 Symmetric Key Encryption 9 2.3.2 Asymmetric Key Encryption 9 2.3.3



References: Anwar Pasha Abdul Gafoor Deshmukh, R. Q. (2011). "Transparent Data Encryption- Solution for Security of Database Contents." (IJACSA) International Jounal of Advanced Computer Science and Applications Vol. 2, No.3. B.Navathe, R. E. a. S. (2003). Fundamentals of database systems, Pearson Education, Inc: 735. B.Navathe, R. E. a. S. (2003). Fundamentals of database systems, Pearson Education, Inc: 744. Baron Schwartz, P. Z., Vadim Tkachenko,Jeremy D.Zawodny, Arjen Lentz & Derek J.Balling (June 2008). High Performance MySQL. Taipei, O 'REILLY. Craig, M. a. (2002). Database administration: the complete guide to practices and procedures, Addison-Wesley: 703. Database, O. (2011). "Online Documentation 11g Release 2 (11.2)." from http://www.oracle.com/pls/db112/portal.portal_db?selected=11. David Litchfield, C. A., John Heasman, Bill Grindlay (2005). The Dtabase Hacker 's Handbook Defending Database Servers, While Publishing, Inc. G.Taylor, A. (2010). SQL For Dummies, Wiley Publishing,Inc. Lan Abramson, M. A., Michael J.Corey, Michelle Malcher (2009). Oracle database 11g A beginner 's guide. New York, Mc Graw Hill. MSDN. (2010). "Use SQL Server Management Studio." from http://msdn.microsoft.com/en-us/library/ms174173.aspx. MySQL. (2010). "DownLoad MySQL Installer." from http://www.mysql.com/downloads/installer/. MySQL. (2010). "MySQL Workbench 5.2." from http://www.mysql.com/products/workbench/. Robert Sheldon, G. M. (2005). Beginning MySQL, Wiley Publishing, INC. Samarati, R. S. S. a. P. (september 1994) "Access Control:Princiles and Practice." IEEE Communications Magazine, 4o. Samarati, R. S. S. a. P. (september 1994). "Access Control:Princiles and Practice." IEEE Communications Magazine: 44. T.Silverstein, R. R. a. P. B. a. C. G. a. A. (2010). Microsoft SQL Server 2008 R2, Paul Boger. T.Silverstein, R. R. a. P. B. a. C. G. a. A. (2011). Microsoft SQL Server 2008 R2. K. Gettman, Paul Boger: 336. T.Silverstein, R. R. a. P. B. a. C. G. a. A. (2011). Microsoft SQL Server 2008 R2, Paul Boger. Wessler, C. Z. a. C. R. a. M. (2009). Oracle 11g for Dummies, Wilcy Publishing,Inc. Zoratti, I. (2006). "MySQL Security Best Practice."

You May Also Find These Documents Helpful

  • Good Essays

    Database administrators should monitor their SQL databases for unauthorized or abnormal SQL injections and write scripts for alarming as well as Simple Network Management Protocol (SNMP) alerts. Additional safeguards can be placed that include encrypting the data elements that reside in long-term storage of the SQL…

    • 575 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    DBM 380 (Data Base Management) Complete Course Material Click on The Link Below to Purchase A+ Work http://hwminute.com/downloads/dbm-380-data-base-management-complete-course-material/ DBM 380 Week 1 DQ 2.docx DBM 380 Week 1 DQ 1.docx DBM 380 Week 1 Individual Assignment Database Design Paper.docx DBM 380 Week 2 DQ 2.docx DBM 380 Week 2 Individual Assignment; Database Management Systems Paper.docx DBM 380 Week 2 DQ 1.docx DBM 380 Week 3 DQ 1.docx DBM 380 Week 3 DQ 2.docx DBM 380 Week 3 Individual Assignment Driving Log.accdb DBM 380 Week 3 Individual Assignment Driving Log.zip DBM 380 Week 3 Individual Assignment ERD.pdf DBM 380 Week 3 Individual Assignment ERD.zip DBM 380 Week 3 Individual Assignment.zip DBM 380 Week 3 Individual Assignment ERD.pdf DBM 380 Week 3 Individual Assignment ERD.zip DBM 380 Week 4 DQ 1.docx DBM 380 Week 4 DQ 2.docx DBM 380 Week 4 Explaination Of Normalization.docx DBM 380 Week 4 Individual Assignment ERD.zip DBM 380 Week 4 Indiviual Assignment Driving Log Relationships.accdb DBM 380 Week 4 Indiviual Assignment Driving Log Relationships.zip DBM 380 Week 4 Individual Assignment ERD.pdf DBM 380 Week 5 DQ 1.docx DBM 380 Week 5 DQ 2.docx DBM 380 Week 5 LT Database FINAL.accdb DBM 380 Week 5 LT Database FINAL.zip DBM 380 Week 5 LT Huffman PowerPoint REVISED.pptx DBM 380 Week 5 LT Huffman Trucking SR-ht-003.docx DBM 380 Week 5 LT Huffman Trucking SR-ht-003.docx $30.00 – Purchase DBM 380 (Data Base Management) Complete Course Material Click on The Link Below to Purchase A+ Work http://hwminute.com/downloads/dbm-380-data-base-management-complete-course-material/ DBM 380 Week 1 DQ 2.docx DBM 380 Week 1 DQ 1.docx DBM 380 Week 1 Individual Assignment Database Design Paper.docx DBM 380 Week 2 DQ 2.docx DBM 380 Week 2 Individual Assignment; Database Management Systems Paper.docx DBM 380 Week 2 DQ 1.docx DBM 380 Week 3 DQ 1.docx DBM 380 Week 3 DQ 2.docx DBM 380 Week 3 Individual Assignment Driving…

    • 395 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Oriyano, S.-P., & Gregg, M. (2011). Hacking Techniques, Tools, and Incident Handeling . Burlington: Jones & Bartelle Learning .…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Cis 515week 3

    • 1024 Words
    • 4 Pages

    Bibliography: (2012). Database systems: Design, implementation, and management. (10 ed.). United States of America: Joe Sabatino.…

    • 1024 Words
    • 4 Pages
    Good Essays
  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Global Finance, Inc. (GFI) is a hypothetical company, which has grown rapidly over the past year. GFI has invested in its network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its overall network security posture has not kept up with the company growth. The trusted computing base (TCB) internal network within the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems that are vital to the company’s operations that also affect the overall financial situation. The most vital application servers is the company is their Oracle database and email system. GFI cannot afford system or network outages, as its cash flow and financial systems heavily depend on the network stability and availability. GFI has recently experienced multiple network attacks resulting in a total estimated loss at more than $1,000,000.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    References: Rob, Peter and Coronel, Carlos. (2005). Database Systems: Design, Implementation, and Management. United States: Thomson Course Technology.…

    • 2376 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Cis 111

    • 790 Words
    • 4 Pages

    (2012). Database systems: Design, implementation, and management. (10 ed.). United States of America: Joe Sabatino.…

    • 790 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Sidpers

    • 2831 Words
    • 12 Pages

    Afyouni, Hassan, Database Security and Auditing, Protecting Data Integrity and Accessibility, 2006 Thomson Course Technology…

    • 2831 Words
    • 12 Pages
    Best Essays
  • Good Essays

    References: Coronel, C. (2013). Database Systems: Design, Implementation, and Management, Tenth Edition. Mason, Ohio, United States: Cengage Learning.…

    • 799 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Athabasca Assignment

    • 837 Words
    • 4 Pages

    Relational databases are not new technology. Commercially, they gained importance in the early 1980s with the introduction of Oracle’s relational database, and since then they have been an essential tool for most businesses. Databases are critical tools that help to support various business functions in an organization. These information systems help a business to build and maintain competitive advantage. Databases not only support the operational levels of business—they are also used to support the activities of managers.…

    • 837 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Sanhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241-243.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    research paper

    • 329 Words
    • 2 Pages

    Zemke, F. (2012, MARCH). What 's new in SQL:2011. Retrieved September 2012, from www.sigmod.org: http://www.sigmod.org/publications/sigmod-record/1203/pdfs/10.industry.zemke.pdf…

    • 329 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cis515

    • 3200 Words
    • 13 Pages

    O 'Brien, M. C., & Winter, J. (n.d.). Developing Stored Procedures for Microsoft SQL Server.…

    • 3200 Words
    • 13 Pages
    Powerful Essays