z-logo
open-access-imgOpen Access
Database Security in a Dynamic IT world
Author(s) -
Temitope Awodiji
Publication year - 2021
Language(s) - English
Resource type - Conference proceedings
DOI - 10.5121/csit.2021.111613
Subject(s) - computer science , computer security , confidentiality , database security , data integrity , data breach , information privacy , data security , information sensitivity , internet privacy , database , encryption
Databases are vulnerable. Public statements by Target, Home Depot, and Anthem following their extremely advertised data breaches are each uniform and succinct on how their breaches unfolded: unauthorized access to those systems that ultimately led to the extraction of sensitive information. A comprehensive strategy to secure a database is over data security. Usually, security events will be related to the later action: illegitimate access to data confidentiality damage, injury to the integrity of knowledge, loss of data accessibility (Discover). Loss of privacy of data, creating them accessible to others without a right of access is not visible within the database and does not need changes deductible database. This paper addresses these events to confirm database security.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here