Page 143 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 143

Mithilesh Kumar Dubey, Lovely Professional University                         Unit 10: Databases Security




                              Unit 10: Databases Security                                       Notes


            CONTENTS
            Objectives
            Introduction

            10.1 Database Security
                 10.1.1  Levels of Database Security
            10.2 Need for Database Security

            10.3 Mobile Databases Security
                 10.3.1  Mobile Conditions
            10.4 Enterprise Database Security
            10.5 Database Security Policy
            10.6 Summary

            10.7 Keywords
            10.8 Review Questions
            10.9 Further Readings

          Objectives


          After studying this unit, you will be able to:
              Understand the concept of databases security
              Discuss need for database security
              Explain mobile database security

              Understand enterprise database security
              Discuss database security policy

          Introduction

          As the  utilization of Internet technology is mounting for both  the Intranet and the Internet,
          information security is turning out to be exceedingly vital for organizations. The World Wide
          Web  offers  a  suitable, cheap,  easily accessible  and  instantaneous  manner  of  information
          distribution. It makes the distribution very simple but, it is evenly significant to make sure that
          information should only be available to equitable users who have access rights to it.
          With many organizations using database dependent dynamic web pages, corporate information
          security has turn out  to be  tremendously significant. Previously,  strict  database access  or
          specialized client software was necessary for viewing the data, but nowadays a simple web
          browser is enough to view data in a database that is not correctly protected. Therefore, information
          security is at a susceptible stage. Therefore, the more a computing firm moves from the processor
          of the client/server to the Internet the more possibilities of security dispersion.
          Security database professionals have to depend on network administrators for executing firewalls
          or other mechanisms to defend local data as the nature of Intranet/Internet information access



                                           LOVELY PROFESSIONAL UNIVERSITY                                   137
   138   139   140   141   142   143   144   145   146   147   148