Open Access Open Access  Restricted Access Subscription Access

Brief Study on Database Security

Vineet Patel, Akanksha Kulkarni

Abstract


A database management system is frequently used by users to handle data protection, which is at the core of many security systems. The security of database management systems is the main topic of this essay, which serves as an illustration of how application security may be planned and implemented for certain tasks. Due to the fact that databases are more recent than programming languages and operating systems, there is currently a lot of interest in DB WS Security. Many commercial and governmental organizations depend on databases because they store data in a way that makes retrieving and maintaining it simple and effective. Because databases are a favourite target for attackers, their structure and contents are regarded as significant company assets that must be carefully protected. Similar to other computing systems, databases have some fundamental security requirements. Access control, excluding erroneous data, user authentication, and reliability are the main issues. The problems and dangers of database security are discussed in this paper.


Full Text:

PDF

References


'Security in Computing" 4th edition Mr.Charles,P.Pfleeger-Pfleeger Consulting Group, Shari Lawrence Plleeger.

Bertino et al Database security-Concepts, Approaches and challenges IEEE Transactions on dependable and secure computing, 2005.

http ://www.imperva.conn/downloads/To pTen Database Security Threats.

S. Singh, Database System: Concepts, Desi gn and applications New Delhi: Pearson Education India, 2009.

S. Sumanthi, Fundamentals of relational database management systems Berlin: Springer, 2007.

http://vvww.appsecinc.com/ downloads/ Risk Database Security in 2012.pdf.

Emil Burtescu, "DATABASE SECURITY ATTACKS AND CONTROL METHODS" Joumal of Applied Quantitative Methods, Vol. 4, no. 4, Winter 2009.

R. Agrawal, R. Srikant, and Y. Xu. "Datåbase technologies for electronic commerce." Proceedings of the 28th International Conference on Very Large Databases. Morgan Kaufmann, vol .2, pp. 10551058, January 2()02.

A. Furmanyuk, M. Karpinskyy and B.

Borowik, "Modern Approaches to the Database

Protection," 2007 4th IEEE Workshop on

Intelligent Data Acquisition and Advanced

Computing Systems: Technology and Applications, Dortmund, pp. 590-593, September 2007.

A. Asmawi, Z. M. Sidek, and S. A. Razak

System Architecture for SQL Injection and

Insider Misuse Detection System for DBMS", In

International Symposium on Information Technology, vol. 4, pp. 1-6, June 2008


Refbacks

  • There are currently no refbacks.