z-logo
open-access-imgOpen Access
Database Security in a Dynamic IT world
Author(s) -
Temitope O Awodiji
Publication year - 2021
Publication title -
software engineering and applications
Language(s) - English
Resource type - Conference proceedings
eISSN - 2325-2286
pISSN - 2325-2278
DOI - 10.5121/csit.2021.111613
Subject(s) - computer science , computer security , confidentiality , database security , data integrity , data breach , information privacy , data security , information sensitivity , internet privacy , database , encryption
Databases are vulnerable. Public statements by Target, Home Depot, and Anthem following their extremely advertised data breaches are each uniform and succinct on how their breaches unfolded: unauthorized access to those systems that ultimately led to the extraction of sensitive information. A comprehensive strategy to secure a database is over data security. Usually, security events will be related to the later action: illegitimate access to data confidentiality damage, injury to the integrity of knowledge, loss of data accessibility (Discover). Loss of privacy of data, creating them accessible to others without a right of access is not visible within the database and does not need changes deductible database. This paper addresses these events to confirm database security.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom