Page 151 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 151
Unit 10: Databases Security
1. Human factors, their tasks, roles, other persons. Notes
2. Location (and altering location in time), hard and software (mobile site and network
traits, equipment and tools).
3. Information, application traits (such as type, size). These mobile traits, and particularly
their dynamics, and limits like frequent disconnections create a mobile work with
database systems difficult. This is the reason for a variety of difficulties in protecting
mobile work and for needing a new perspective to renowned security measures, or
stipulate new ones.
Wireless network is turning out to be a usually used communication platform. It offers a cheaper
manner to get associated and in some cases this is the only method to reach people. Though, it
has a number of simple and hard problems and they must be solved before Mobile database
system can be constructed.
The rising trend is to make all service offering disciplines, like web, E-commerce, workflow
systems, etc., fully mobile in order that any service can be offered from any position. Customer
can look for the information space from any position at anytime and do their shopping, make
flight reservation, open bank account, and so on. This is what the wireless technology forcing us
to.
Self Assessment
Fill in the blanks:
7. Database security is an expertise within the broader discipline of ........................
security.
8. To function on business data anytime and anywhere is the major objective pursued by
developing ........................ assistance in database context.
9. Traditional database security offers techniques and approaches to manage problems with
respect to database servers in a ........................ context.
10.4 Enterprise Database Security
For many system administrators, the expressions “open systems” and “security” can appear
impossibly conflicting. Preserving security for a centralized database system is hard enough,
and when faced with a network of networked databases, preserving a level of access and update
security is a formidable confront. Security is frequently an afterthought, and the database industry
is overwhelmed with sub-standard security, particularly for enterprise databases that are cobbled-
together as an effect of external factors such as business acquisitions.
There are many troubles with security for enterprise databases, far more than the IT industry
would be concerned to acknowledge. These security disclosures stem from the following
architectural concerns:
1. Multiple entry points: Unlike a customary centralized database, web-based databases
have several entry points. These entry points comprise web servers, VPN access, app
server access and access to databases through web portal protocols. When dealing with
accurately hundreds of entry points, special care requires to be taken to insure that damaging
viruses are not introduced into the system.
2. Weakest link problem: The current publicity regarding security holes in enterprise security
underscores the weakest link problem. When dealing with such a broad variety of entry
points and platforms, the overall system security is only as protected as the weakest link
in the federation.
LOVELY PROFESSIONAL UNIVERSITY 145