Page 151 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 151

Unit 10: Databases Security




          1.   Human factors, their tasks, roles, other persons.                                Notes
          2.   Location (and altering location  in time), hard and  software (mobile  site and network
               traits, equipment and tools).
          3.   Information, application traits (such as type, size). These mobile traits, and particularly
               their  dynamics, and  limits like  frequent disconnections  create  a  mobile  work  with
               database systems difficult. This is the reason for a variety of difficulties in protecting
               mobile work and for  needing a new perspective to renowned security measures,  or
               stipulate new ones.

          Wireless network is turning out to be a usually used communication platform. It offers a cheaper
          manner to get associated and in some cases this is the only method to reach people. Though, it
          has a number of simple and hard problems and they must be solved before Mobile database
          system can be constructed.
          The rising trend is to make all service offering  disciplines, like web, E-commerce, workflow
          systems, etc., fully mobile in order that any service can be offered from any position. Customer
          can look for the information space from any position at anytime and do their shopping, make
          flight reservation, open bank account, and so on. This is what the wireless technology forcing us
          to.

          Self Assessment

          Fill in the blanks:
          7.   Database  security  is an  expertise  within  the  broader  discipline  of  ........................
               security.
          8.   To function on business data anytime and anywhere is the major objective pursued by
               developing ........................ assistance in database context.
          9.   Traditional database security offers techniques and approaches to manage problems with
               respect to database servers in a ........................ context.
          10.4 Enterprise Database Security


          For many system administrators, the expressions “open  systems” and “security” can appear
          impossibly conflicting. Preserving security for a centralized database system is hard enough,
          and when faced with a network of networked databases, preserving a level of access and update
          security is a formidable confront. Security is frequently an afterthought, and the database industry
          is overwhelmed with sub-standard security, particularly for enterprise databases that are cobbled-
          together as an effect of external factors such as business acquisitions.

          There are many troubles with security for enterprise databases, far more than the IT industry
          would  be concerned  to acknowledge.  These  security  disclosures  stem  from  the  following
          architectural concerns:
          1.   Multiple entry points: Unlike a customary centralized  database, web-based databases
               have several entry points. These entry points comprise web servers, VPN access,  app
               server access and access to databases through web portal protocols. When dealing with
               accurately hundreds of entry points, special care requires to be taken to insure that damaging
               viruses are not introduced into the system.
          2.   Weakest link problem: The current publicity regarding security holes in enterprise security
               underscores the weakest link problem. When dealing with such a broad variety of entry
               points and platforms, the overall system security is only as protected as the weakest link
               in the federation.


                                           LOVELY PROFESSIONAL UNIVERSITY                                   145
   146   147   148   149   150   151   152   153   154   155   156