Preview

Database Term Paper

Satisfactory Essays
Open Document
Open Document
455 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Database Term Paper
Stratford University

Database Security
(SOF620)

Professor: Godson Chukwuma

Term Paper Assignment

Submitted by
Rafik Abdelhamid Osmane

Top ten threats in Database security:

1. Excessive Privilege Abuse
2. Legitimate Privilege Abuse
3. Privilege Elevation
4. Database Platform Vulnerabilities
5. SQL Injection
6. Weak Audit Trail
7. Denial of Service
8. Database Communication Protocol Vulnerabilities
9. Weak Authentication
10. Backup Data Exposure

The common mistakes that are made in database systems are: 1. Poor design/planning 2. Ignoring normalization 3. Poor naming standards 4. Lack of documentation 5. One table to hold all domain values 6. Trying to build generic objects 7. Lack of testing

Recommended solutions to protect the Database are:
-Audit the industry 's widest range of databases for security, configuration and operational vulnerabilities, exploit root level access to collect evidence for reporting and ensure you secure you most valuable assets.
-Provide detailed reporting and remediation guidelines to your security staff so they have the insight they need to resolve issues quickly and easily.
-Ensure policy compliance with pre-defined policy report templates and a single-scan capability that check for both policy compliance and vulnerabilities in the same scan - streamlining security configuration assessment efforts for internal and external auditors.
-Verify and validate vulnerabilities and risks: N-expose and M-etasploit can use the results from the database scan to penetrate the operating system to find additional vulnerabilities that would otherwise be left hidden.

Open source (or not) database platforms like MySQL, Microsoft SQL Server, and PostgreSQL that have achieved broad acceptance provide adept, malicious hackers an obvious path to attack websites en masse. With FireHost, we can trust that our database will be protected with the most advanced security available.



References: 1. Ten Common Database Design Mistakes by Louis Davidson. 2. Database design pitfalls by Victor Campos. 3. Database security solutions by Rapid 7 technologies.

You May Also Find These Documents Helpful

  • Good Essays

    1. Why is it critical to perform a penetration test on a Web application and a Web server prior to production implementation?…

    • 575 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Before any strategy takes place, an auditor must determine the end result desired from the Information Technology being used as well as the type of technology being dealt with. The most important thing is security thus it is vital to know this technology in and out to be able to determine its strengths and weaknesses. This allows for proper compensation to combat such attacks whether they are fraudulent or accidental in nature. It is necessary to be familiar with different types of proven viable internal control setups to properly test and gage an IT’s internal control system. There are three different strategies use when testing internal controls. First includes assessing the controls using user control information. In this strategy, an auditor would gather computer-generated reports and compare those to all documentation on specific transactions. This process is also known as auditing around the computer because it deals with more hard copy documents. The next strategy entails using application controls to determine the level of risk…

    • 627 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The policy begins with assessing the risk to the network and building a team to respond. Continuation of the policy requires implementing a security change management practice and monitoring the network for security violations. Lastly, the review process modifies the existing policy and adapts to lessons learned.…

    • 4827 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Assignment

    • 533 Words
    • 3 Pages

    Organizations are under increased pressure to audit every action that a user performs within a database. This is due to increased focus on security, risk, accountability and avoidance of fraud and corruption. While security prevention measures (logins, firewalls, tokens etc.) are important to prevent unauthorized access to the data in the first place, as this survey shows, most breaches occur by users who are authorized but are either negligent or malicious.…

    • 533 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Report health and safety issues to the appropriate people and complete health, safety and security records according to legal and organisational requirements.…

    • 356 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Database

    • 504 Words
    • 4 Pages

    Copy and paste the specified ipconfig /all command output from the Windows CLI into the Task 1 box provided below.…

    • 504 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3445 Lab 7

    • 371 Words
    • 2 Pages

    3. What possible high risk vulnerabilities did the Rats tool find in the DVWA application source code?…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    CIS515 - Module05

    • 693 Words
    • 3 Pages

    Describe technical architecture as a structured process and compare it to software architecture. How are the two related? In what ways does it allow us to design better systems?…

    • 693 Words
    • 3 Pages
    Good Essays
  • Good Essays

    thesis of dbms

    • 1111 Words
    • 5 Pages

    The Mallows, also known as Alida Chanler Emmet and Christopher Temple Emmet Estate, is a historic home located at Head of the Harbor in Suffolk County, New York. It is a Colonial Revival estate home designed in 1906 by noted architect Charles A. Platt (1861–1933). It is an imposing structure, finished in stucco with powerful wooden detailing at the principal doorways, roof cornice and porch. It is a large rectangular mass, two full stories in height, seven bays long, with projecting wings. It features a simple pitched gable roof and a two story porch on the west wing with large Doric order piers.[2]…

    • 1111 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Audit Memo

    • 780 Words
    • 4 Pages

    Types of RDBMS: MySQL 5.0 - an open-source database used extensively in small or medium-sized web applications. One of the simplest databases to secure from hacking because of the small attack surface it exposes…

    • 780 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    The class of vulnerabilities known as SQL injection continues to present an extremely high risk in the current network threat landscape. In 2011, SQL injection was ranked first on the MITRE Common Weakness Enumeration (CWE)/SANS Top 25 Most Dangerous Software Errors list.1 Exploitation of these vulnerabilities has been implicated in many recent high-profile intrusions. Although there is an abundance of good literature in the community about how to prevent SQL injection vulnerabilities, much of this documentation is geared toward web application developers. This advice is of limited benefit to IT administrators who are merely responsible for the operation of targeted web applications. In this document, we will provide concrete guidance about using open source tools and techniques to independently identify common SQL injection vulnerabilities, mimicking the approaches of attackers at large. We highlight testing tools and illustrate the critical results of testing.…

    • 4315 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    Essay Dbms

    • 548 Words
    • 3 Pages

    As our requirement for our DBMS subject, we interviewed Mr. Charleton Lopez, one of the database administrators hired by Accenture, last Saturday at SM Mall of Asia.…

    • 548 Words
    • 3 Pages
    Good Essays