Page 156 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 156
Information Security and Privacy
Notes The general factor in nowadays global economy where most of the business is prepared
electronically by means of B2B [Business to Business] or by means of B2C [business to
consumer] or other more conventional methods’ is electronic transfer and storage of data.
Database security is also an expertise within the broader discipline of computer security.
For many businesses applications are going mobile that signifies using enterprise data in
mobile context, therefore using a mobile DBMS.
Security is frequently an afterthought, and the database industry is overwhelmed with
sub-standard security, particularly for enterprise databases that are cobbled-together as
an effect of external factors such as business acquisitions.
To be precise, in order to find out exactly which security policies are required, you need to
perform an information risk assessment.
10.7 Keywords
Database: The database is a compilation of useful data and can be considered as the most
essential constituent of an organization and its economic enlargement.
Web-based Databases: Database that are configured to permit external communications from
other web portals face an outstanding data security challenge.
10.8 Review Questions
1. Explain the concept of database security with examples.
2. Illustrate the basic principle used for any security workers.
3. What are the common failures that intimidate database security? Illustrate.
4. Explain the security traits for an unused DBMS.
5. Explain why database servers are attacked by hackers.
6. Describe the need for database security.
7. Explain the concept of securing mobile databases.
8. Illustrate the issues related with Enterprise Database Security.
9. To be precise, in order to find out exactly which security policies are required, you need to
perform an information risk assessment. Comment.
10. Describe the various policy elements necessary for keeping policies simple and convenient
long term.
Answers: Self Assessment
1. corporate 2. vulnerabilities
3. database 4. audit trails
5. global 6. enterprise
7. computer 8. mobility
9. non-mobile 10. Multiple
11. weakest link problem. 12. security
150 LOVELY PROFESSIONAL UNIVERSITY