Database Security

Improved Essays
In all businesses and organisations, Databases are used to store all the core activities/information and often when there a major changes or restructure of the business the first process of many businesses is to change their databases to realign with their goal which makes them a valuable asset to any organisation. (Margulies, Pfleeger, Pfleeger 2015). Databases stores and maintain data at one central location so users can easily access it whenever needed. Through the use of Queries, databases have the ability to present data in multiple ways by linking data together for users to view and process vital information about their business and reports on performance throughout all departments (Knickelbine n.d.). Databases provide a fast and efficient …show more content…
Based on the three principles of computer security; Confidentiality, Integrity and Availability, they have clear relations to database management systems. Integrity and confidentiality is a major concern within database security since data is constantly being stolen leaving it unprotected against malicious users. Confidentiality is the protection against disclosure of sensitive information, integrity is the protection against unauthorised access and modification to sensitive data. (Druzovec, Holbl & Turkanovic …show more content…
However, there are various techniques to prevent the two types of attacks on database, direct and indirect. For direct attacks, the user will directly try to obtain sensitive data from the database with queries. Primary methods used to control direct attacks is access control to correctly classify data sets (Hylkema

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1320 Unit 2

    • 866 Words
    • 4 Pages

    These commands are used for updating, inserting, modifying, and querying the data within the database 10. By using SQL queries with any RDBMS, it is possible to create virtual tables, or dynamic views, whose contents materialize once documented. These views may typically be manipulated in the same way as a base table will be manipulated, through SQL SELECT queries. Materialized views, which area unit stored physically on a disk and refreshed at acceptable intervals or events, may also be used. 12.…

    • 866 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 1 Study Guide

    • 573 Words
    • 3 Pages

    Database management system (DBMS) – is a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze data. Offers timely, interactive, and flexible data access. 12. Scalability – which means that a system can be expanded, modified, or downsized to easily meet the rapidly changing needs of a business enterprise. 13.…

    • 573 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Logical security : Logical security consists of software safeguards for an organization's systems including user identification and password access, authentication, access rights and authority levels. These measures are to ensure that only authorized users are able to perform actions or access information in a network. Access control mechanism: As part of access control mechanism we are using MAC (mandatory access control mechanism) where users do not enjoy the privileges of deciding who can access their files. Here the operating system is the decision maker overriding the user’s wishes.…

    • 345 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    o Description of this job:  Responsibilities to contain database administration, optimization, security,…

    • 382 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    1.02.01 Warning Banner

    • 567 Words
    • 3 Pages

    Sub section 9.1.02.01 – Warning Banners Current Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers,desktops, VPN connections, network devices). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government regulations and UnitedHealth Group directives. Modify Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers, desktops, VPN connections, network devices, application elevations). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    Data Confidentiality: When you keep important data it is important that the data doesn’t go out to the wrong hands. So if a business data is suddenly leaked online or maybe stolen, then this can result in a huge loss for the business and this can potentially put the business out of business. To overcome this problem, then you would need a good security program which can safeguard against any breach in confidentiality. Data Integrity: This is used to ensure that the most important data is secure and also makes sure that the data isn’t messed around with. If any of the data has been messed around with then this can result in major problems.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Ist 305 Assignment 6-3

    • 538 Words
    • 3 Pages

    ID: 2597622 IST 305 – Assignment 6 6-1: The Toronto Globe and Mail had an information systems issue with how their business databases and files were stored. Throughout the firm, multiple databases were isolated and duplicated among departments. This had caused issues, such as their subscribers receiving unnecessary marketing material, and not being able to keep the databases secure. In order for them to solve this issue was to implement and store all company data into a data warehouse using SAP NetWeaver, as well as educate their own employees on the new system to prevent further inconsistent databases. By implementing the data warehouse and training their employees, it produced the results that management envisioned.…

    • 538 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Unit 7 D2

    • 693 Words
    • 3 Pages

    Describe the functions of database technology, the differences between centralized and Distributed database architecture, how data quality impacts performance, and the role of A master reference file in creating accurate and consistent data across the enterprise. In Chapter three, Turban discusses four types of database technologies: 1. Databases -store data gathered from business applications, transaction processing systems, and sensors.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Ethical Man Month Essay

    • 637 Words
    • 3 Pages

    Question 1: Using The Mythical Man Month reading found on the course homepage, read the project problems mentioned in the text. List the difficulties and errors that occurred in these failed programming projects. In the Mythical Man reading the difficulties and errors that occurred include;  Time complexity  As input increases, Output decreases  Communication Barriers  High cost…

    • 637 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Case Study Assignment – I Campbellsville University MASSIVE DATABASE MASTERING - MASTERCARD INTERNATIONAL Various affiliations are endeavoring to address the open entryways and limit challenges related with "huge data." Industry masters gage that the total volume of data is increasing at general interims and most by a wide margin of new data being delivered is prepared to go spaces. MasterCard Universal (www.mastercard.com) is not any more impossible to miss to think about the issues identified with monstrous databases. MasterCard has amassed a data circulation focus that is more than 100-terabytes in size. Insiders expect that it will create to more than 1.8 petabytes.…

    • 933 Words
    • 4 Pages
    Great Essays
  • Decent Essays

    Confidentiality: Only the authorized people can access the data, no other persons cannot access the data or accounts. Integrity: only the authorized person can change the data, no other people cannot access it. Availability: The data should be available to the authorized users 24/7.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Command Prompt

    • 1077 Words
    • 5 Pages

    Introduction Organizations handle vast amounts of data. A large organization may have to deal with terabytes or petabytes worth of data. For a company to be successful, there must be a meaningful way in which the data that is used as a part of company operations is managed. This includes an effective file management system, in which the files are appropriately secured, and the information is backed up in order to meet company requirements. The files generated as a part of company operations are company property, and as such the information must be managed effectively.…

    • 1077 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    The purpose of this paper is to describe the network configuration, explaining the role of each component and connection of the scenario provided. Specifically, I will discuss the functions of the components and describe how they contribute to the network. Along with this I will modify the appropriate components of the provided database with the information regarding the employees’ computers and the upgrade. Network Configuration Network configuration allows a system admin to set up a network to use to communicate. Per Techopedia, “Network configuration is the process of setting a network 's controls, flow and operation to support the network communication of an organization and/or network owner.”…

    • 923 Words
    • 4 Pages
    Improved Essays