Preview

Database Security and Encryption: A Survey Study

Powerful Essays
Open Document
Open Document
3977 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Database Security and Encryption: A Survey Study
International Journal of Computer Applications (0975 – 888)
Volume 47– No.12, June 2012

Database Security and Encryption: A Survey Study
Iqra Basharat

Farooque Azam

National University of Sciences and
Technology (NUST), H-12,
Islamabad, Pakistan

National University of Sciences and
Technology (NUST), H-12,
Islamabad, Pakistan

ABSTRACT
Security in today’s world is one of the important challenges that people are facing all over the world in every aspect of their lives. Similarly security in electronic world has a great significance. In this paper, we survey the security of database.
This is an area of substantial interest in database because we know that, the use of database is becoming very important in today’s enterprise and databases contains information that is major enterprise asset. This survey was conducted to identify the issues and threats in database security, requirements of database security, and how encryption is used at different levels to provide the security.

Abdul Wahab Muzaffar
National University of Sciences and
Technology (NUST), H-12,
Islamabad, Pakistan

There are four types of controls mentioned by Denning [1] to obtain the database protection, those includes: access control, information flow control, cryptographic flow control and inference control.

Integrity

Confidentiality

Availability

General Terms
Your general terms must be any term which can be used for general classification of the submitted material such as Pattern
Recognition, Security, Algorithms et. al.

Keywords

Database
Security

Database, Security, Encryption, Access Control.

1. INTRODUCTION
We ask that authors follow some simple guidelines. In essence, we ask you to make your paper look exactly like this document. The easiest way to do this is simply to download the template, and replace the content with your own material.
Information or data is a valuable asset in any organization.
Almost all organization



References: [1] Ahmad Baraani-Dastjerdi; Josef Pieprzyk; Baraanidastjerdi Josef Pieprzyk ; ReihanedSafavi-Naini, Security In Databases: A Survey Study, 1996 [2] http://en.wikipedia.org/wiki/Database_security 27th Oct, 2010 1:00am Vulnerabilities, 2006 White Paper. Services, 2009. ICIW '09. Fourth International Conference on; Publication Year: 2009, Page(s): 163 – Technologies (E-ISSN: 2044-6004) 368 Volume 2, Issue 3, June 2011, page(s); 368-372 Sharing; Computer Supported Cooperative Work in Design, 2006 International Conference on Data Engineering (2007) Publisher: IEEE, Page(s): 676-685. Applications; Published in Industrial Informatics, 2008.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS3350 week 1

    • 287 Words
    • 3 Pages

    9. Security controls and security countermeasures to help protect the Master SQL Database that houses customer privacy data and intellectual property assets.…

    • 287 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Database administrators should monitor their SQL databases for unauthorized or abnormal SQL injections and write scripts for alarming as well as Simple Network Management Protocol (SNMP) alerts. Additional safeguards can be placed that include encrypting the data elements that reside in long-term storage of the SQL…

    • 575 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    This paper gives an idea regarding the important aspects of the database security. It mainly focuses on the security parameters such as confidentiality, authenticity and availability of the data. It also explains the different threats for the security in an organization in relation to the database. The basic steps which are required to control the loss of data are explained in detail. Among the controls the encryption process is the one which has to be followed to control the access into an…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Assignment

    • 533 Words
    • 3 Pages

    Organizations are under increased pressure to audit every action that a user performs within a database. This is due to increased focus on security, risk, accountability and avoidance of fraud and corruption. While security prevention measures (logins, firewalls, tokens etc.) are important to prevent unauthorized access to the data in the first place, as this survey shows, most breaches occur by users who are authorized but are either negligent or malicious.…

    • 533 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Various authentication methods are used and range from the simple to complex. The security level provided will vary depending on the utilized technique and deployment method. The most dominant method involves authentication with a password and username. However, this is also one of the most insecure methods. We can describe these devices and systems depending on the three factors:…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Data Security

    • 335 Words
    • 2 Pages

    7. Each of the following is a variation available in network access control (NAC) implementations except __________.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Businesses need to ensure the secure storage of company files and the guaranteed privacy of employee information. With the increased use and demand for network computing, information security has become a high priority. With all the ways in which someone can gain access to private and confidential information, the previous safe measures need to be enhanced and improved (Yaoxue Zhang; Laurenc T. Yang; Yuezhi Zhou; Wenyuan Kuang. 2010). For example, employee and company files are…

    • 962 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    data protection

    • 2038 Words
    • 9 Pages

    policy these are termed ‘users’), are fully aware of and abide by their duties and…

    • 2038 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 3 Issue 4, April - 2014 Evaluation of DES, TDES, AES, Blowfish and Two fish Encryption Algorithm: Based on Space Complexity MD Asif Mushtaque Harsh Dhiman M.Tech(CS&E) School of Computing Science and Engineering Galgotias University, Greater Noida, U.P .…

    • 2278 Words
    • 17 Pages
    Good Essays
  • Better Essays

    Since the society has become progressively dependent on networks for business, the management of company’s information online has developed into an issue to be concerned. AIS, which is short for Accounting Information System, is not merely related to accounting information management as the business develops around the world. In the various explanations of AIS in the Lecture 1, p12130 Accounting Information System, presented at the University of Nottingham Ningbo by Trevor Bayley, Vaassen (2002) defined AIS as provides information for decision-making and accountability to internal and external stakeholders providing the right conditions for decision making and ensures that no assets illegitimately exit the organisation. In terms of practice of business by networks, the security of information is important. This essay will first describe a related News story. Then, several ways of illegally getting access to essential information by hackers will be provided. Moreover, considering the formation and reality of network business, the essay will analyse how to guarantee the security of a company from two aspects, externally and internally. Finally, a brief conclusion will be provided.…

    • 1586 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Design and Security

    • 702 Words
    • 2 Pages

    During the testing phase of the user interface, I have found three key areas that showed security risk and vulnerability with the user interface and they are:…

    • 702 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    DATABASE MANAGEMENT

    • 1145 Words
    • 5 Pages

    1. MySQL is the world's second most widely used open-source relational database management system (RDBMS). It is named after co-founder Michael HYPERLINK "http://en.wikipedia.org/wiki/Michael_Widenius"Widenius's daughter, My. The SQL phrase stands for Structured Query Language.…

    • 1145 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Unit 2 Assignment 2

    • 1463 Words
    • 6 Pages

    - Security issues for particular types of data, given business needs, anticipated threats and vulnerabilities;…

    • 1463 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Term Paper

    • 1970 Words
    • 8 Pages

    The subject of my paper is about the history and origin of protecting information resources. Data protection dated back as far as 1890 was with the U.S. Census. Then, employers used a punch card to record equipment which was known as a tabulating machine. The punch cards were used for data storage for several years. The photo below shows what a punch card looks like.…

    • 1970 Words
    • 8 Pages
    Good Essays