Page 143 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 143
Mithilesh Kumar Dubey, Lovely Professional University Unit 10: Databases Security
Unit 10: Databases Security Notes
CONTENTS
Objectives
Introduction
10.1 Database Security
10.1.1 Levels of Database Security
10.2 Need for Database Security
10.3 Mobile Databases Security
10.3.1 Mobile Conditions
10.4 Enterprise Database Security
10.5 Database Security Policy
10.6 Summary
10.7 Keywords
10.8 Review Questions
10.9 Further Readings
Objectives
After studying this unit, you will be able to:
Understand the concept of databases security
Discuss need for database security
Explain mobile database security
Understand enterprise database security
Discuss database security policy
Introduction
As the utilization of Internet technology is mounting for both the Intranet and the Internet,
information security is turning out to be exceedingly vital for organizations. The World Wide
Web offers a suitable, cheap, easily accessible and instantaneous manner of information
distribution. It makes the distribution very simple but, it is evenly significant to make sure that
information should only be available to equitable users who have access rights to it.
With many organizations using database dependent dynamic web pages, corporate information
security has turn out to be tremendously significant. Previously, strict database access or
specialized client software was necessary for viewing the data, but nowadays a simple web
browser is enough to view data in a database that is not correctly protected. Therefore, information
security is at a susceptible stage. Therefore, the more a computing firm moves from the processor
of the client/server to the Internet the more possibilities of security dispersion.
Security database professionals have to depend on network administrators for executing firewalls
or other mechanisms to defend local data as the nature of Intranet/Internet information access
LOVELY PROFESSIONAL UNIVERSITY 137