Encryption a Means of Security Essay

4164 Words Jul 15th, 2013 17 Pages
Seminar Presentation

On

Application of encrypting techniques

In

Database Security

By

Uweh SKelvin

ABSTRACT

Security in today’s world is one of the important challenges that people are facing all over the world in every aspect of their lives. Similarly security in electronic world has a great significance. In this seminar work, we discuss the applications of encryption techniques in database security. This is an area of substantial interest in database because we know that, the use of database is becoming very important in today’s enterprise and databases contains information that is major enterprise asset. This research work discuses the application of various encryption techniques in database security, and how
…show more content…
As discussed previously confidentiality imposes limits while retrieving the secure data and therefore averting the illegal access to the data. Integrity means that the data will not be tainted in any way. Availability of data on time is the property of secure databases. Ahmad (1996). There are four types of controls mentioned by Denning to obtain the database protection, those includes: access control, information flow control, cryptographic flow control and inference control.
[pic]
Access controls ensures that all direct accesses to the system are authorized. The access controls governs that that can access the system’s objects. Often it happens that important information or data is leaked out or misused not because of defective access control but because of improper information flow. When policies for information flow are not properly defined than the system data is less protected. The cryptographic control, controls (secures) the data by encrypting it.
Another approach has been adopted for securing the databases. It has been discussed that to make the databases secure different policies at organization level can be implemented. Data/information is always a most important asset for any organization whose security cannot be compromised. With the advances in technology, the risk to these valuable assets increases. So their security is a big challenge Khaleel etal (2011) .In different database security layers are defined shown in figure (2) below. These layers

Related Documents