Page 155 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 155

Unit 10: Databases Security




             This would be recorded and could help organisations keep track of whatever data packet  Notes
             was sent out. He said that this would help in auditing, fraud and extrusion detection. This
             concept has again been conceived in the Pune development centre, with much of the work
             done here.
             R&D

             Mr Mark said that there was always a notion that Symantec was not doing much in the
             innovation space other than buying out or partnering others for its various products, as
             most of its growth has been through acquisition. “But we are spending close to 15 per cent
             of our annual revenue for research and development and last year it was approximately
             $750 million.”
             Mr Mark said that globally it was more concerned by the changes in technology which
             required better security measures, the disappearing boundary lines of the companies and
             consumerisation of IT.
             Challenges
             “In India, the challenges are the changing technology areas, fostering innovation  and
             ensuring that the momentum does not fall,” the newly appointed CTO, Mr Basant Rajan
             said.

             Security Products
             Mr Rajan said that it was keeping track of the one billion Internet users who would be
             accessing the net for various purposes. He said the devices that would be used to access
             would be different and Symantec was already on the path to develop security products for
             these new users.

             As CTO, Mr Rajan would be instrumental in steering the Symantec Research Labs and
             Advanced Concept Group projects in the country. He would be working with Government
             agencies in security and compliance domains. Currently there was two advanced concept
             groups based out of the US and was looking at Government related and defence segments.
             Europe was also another location where they have set up a research consortium and Asia
             Pacific was the next location they were looking at, he said. In Singapore, it is the security
             wireless access that was of main concern, while for India it was drawing up its plans, he
             added.

          Source:  http://www.thehindubusinessline.in/2007/06/06/stories/2007060601260400.htm

          10.6 Summary

              As the utilization of Internet technology is mounting for both the Intranet and the Internet,
               information security is turning out to be exceedingly vital for organizations.
              The safest database you can visualize must be found  in a most firmly locked bank, or
               nuclear-proof bunker, installed on a standalone computer devoid of an Internet or network
               connections, and under protector for 24×7×365.
              A database server is to continue with services, which frequently enclose security problems,
               and you should be practical about probable threats.
              Securing the database is a basic principle for any security workers while mounting his or
               her security plan.

              The database is a compilation of useful data and can be considered as the most essential
               constituent of an organization and its economic enlargement.




                                           LOVELY PROFESSIONAL UNIVERSITY                                   149
   150   151   152   153   154   155   156   157   158   159   160