Wednesday, May 6, 2020
Database Security A Comprehensive Approach For Data...
Abstract As organizations increase their reliance on, possibly distributed, information systems for daily business, they become more vulnerable to security breaches even as they gain productivity and efficiency advantages. Though a number of techniques, such as encryption and electronic signatures, are currently available to protect data when transmitted across sites, a truly comprehensive approach for data protection must also include mechanisms for enforcing access control policies based on data contents, subject qualifications and characteristics, and other relevant contextual information, such as time. It is well understood today that the semantics of data must be taken into account in order to specify effective access controlâ⬠¦show more contentâ⬠¦Security breaches are typically categorized by three main aspects which are Confidentiality, Integrity, and Availability. Confidentiality is protecting the database from unauthorized users. Ensures that users are allowed to do the thing s they are trying to do. Integrity is protecting the database from unauthorized users and ensures that what authorized users are trying to do is correct. Availability authorized users should be able to access data for legal purposes as necessary. A threat can be defined as a hostile agent that causes issues, either casually or by using specialized technique to modify or delete the information managed by a DBMS. These threats can be non-fraudulent threat which are usually caused by natural or accidental disasters or errors or bugs in hardware or software or human errors. Fraudulent threats are caused by authorized users those who abuse their privileges and authority. These improper or hostile users (outsider or insiders) attack the software and/or hardware system, or read or write data in a database. Major Functions as a Database Administrator Keeping up with the vastly growing technologies in the both hardware and software fields while following the current technologies and predicting how those changes will impact the organization and managing the data security and privacy. As a database administrator need to be expert in some of the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.