Preview

Database Security

Powerful Essays
Open Document
Open Document
7064 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Database Security
Journal of Information Technology Education:
Innovations in Practice

Volume 9, 2010

Database Security: What Students Need to Know
Meg Coffin Murray
Kennesaw State University, Kennesaw, GA, USA mcmurray@kennesaw.edu Executive Summary
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The
Defense Information Systems Agency of the US Department of Defense (2004), in its Database
Security Technical Implementation Guide, states that database security should provide controlled, protected access to the contents of a database as well as preserve the integrity, consistency, and overall quality of the data. Students in the computing disciplines must develop an understanding of the issues and challenges related to database security and must be able to identify possible solutions.
At its core, database security strives to insure that only authenticated users perform authorized activities at authorized times. While database security incorporates a wide array of security topics, notwithstanding, physical security, network security, encryption and authentication, this paper focuses on the concepts and mechanisms particular to securing data. Within that context, database security encompasses three constructs: confidentiality or protection of data from unauthorized disclosure, integrity or prevention from unauthorized data access, and availability or the identification of and recovery from hardware and software errors or malicious activity resulting in the denial of data availability.
In the computing discipline curricula, database security is often included as a topic in an introductory database or introductory computer security course. This paper presents a set of sub-topics that might be included in a database security



References: (2009). The 2009 data breach investigations report. Verizon Business. Retrieved January 31, 2010, from http://www.verizonbusiness.com/resources/security/reports/2009_databreach_rp.pdf Bertino, E., Byun, J., & Kamra, A. (2007). Database security. In M. Petkovic & W. Jonker (Eds.), security, privacy, and trust in modern data management (Data-centric systems and applications) (pp Bertino, E., & Sandhu, R. (2005). Database security—concepts, approaches, and challenges. IEEE Transactions on Dependable and Secure Computing, 2(1), 2-18. Defense Information Systems Agency. (2004). Database security technical implementation guide, 7(1). Department of Defense. Retrieved January 31, 2010, from http://www.databasesecurity.com/dbsec/database-stig-v7r1.pdf Guimaraes, M. (2006). New challenges in teaching database security. Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, Kennesaw, GA, USA, 64-67. Jaquith, A. (2007). Security metrics: Replacing fear, uncertainty, and doubt. Redwood City, CA: AddisonWesley Professional. Knox, D. C. (2004). Effective Oracle database 10g security by design. New York: McGraw-Hill/Osborne. Phifer, L. (2010). Top ten data breaches and blunders of 2009. eSecurity Planet, February 10. Retrieved from http://www.esecurityplanet.com/features/article.php/3863556/Top-Ten-Data-Breaches-andBlunders-of-2009.htm Ponemon, L. (2009). Fourth annual US cost of data breach study. Poneomon Institute sponsored by PGP Corporation Steinke, M., Huk, T., & Floto, C. (2003). Helping teachers developing computer animations for improving learning in science education Education International Conference, Chesapeake, VA, 3022-3025. Yang, L. 2009. Teaching database security and auditing. Proceedings of the 40th ACM Technical Symposium on Computer Science Education, Chattanooga, TN, USA.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS3350 week 1

    • 287 Words
    • 3 Pages

    9. Security controls and security countermeasures to help protect the Master SQL Database that houses customer privacy data and intellectual property assets.…

    • 287 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Database administrators should monitor their SQL databases for unauthorized or abnormal SQL injections and write scripts for alarming as well as Simple Network Management Protocol (SNMP) alerts. Additional safeguards can be placed that include encrypting the data elements that reside in long-term storage of the SQL…

    • 575 Words
    • 3 Pages
    Good Essays
  • Good Essays

    • Describe the basic framework or make-up of any database. Discuss what makes databases important as well as a major target to hackers.…

    • 392 Words
    • 2 Pages
    Good Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    This paper gives an idea regarding the important aspects of the database security. It mainly focuses on the security parameters such as confidentiality, authenticity and availability of the data. It also explains the different threats for the security in an organization in relation to the database. The basic steps which are required to control the loss of data are explained in detail. Among the controls the encryption process is the one which has to be followed to control the access into an…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Assignment

    • 533 Words
    • 3 Pages

    Organizations are under increased pressure to audit every action that a user performs within a database. This is due to increased focus on security, risk, accountability and avoidance of fraud and corruption. While security prevention measures (logins, firewalls, tokens etc.) are important to prevent unauthorized access to the data in the first place, as this survey shows, most breaches occur by users who are authorized but are either negligent or malicious.…

    • 533 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    4. To prevent risk or threats of any kind you must safeguard all information stored on the database server. Employees have private information regarding business and customers stored on the database server and the loss or accidental leak of data could be a major hit to the company. This is why it is so important to use the risk management techniques of avoidance, transfer,…

    • 388 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 7 Integrity Maintain valid, uncorrupted, and accurate information.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    This Learning Team Project requires students to develop a semi-quantitative, weighted analysis that generates a comprehensive threat/vulnerability analysis of enterprise security, along with appropriate security measures and recommendations. Additionally, the readings provide background information supporting various techniques, as well as how to do assessments, how to create rankings, and so forth. These readings should be previewed as early as possible, rather than waiting for the specific week. The Enterprise Security Plan is due in Week…

    • 2331 Words
    • 10 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays

Related Topics