Page 156 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 156

Information  Security and Privacy




                    Notes             The general factor in nowadays global economy where most of the business is prepared
                                       electronically by means of B2B [Business to Business] or by means of B2C [business to
                                       consumer] or other more conventional methods’ is electronic transfer and storage of data.
                                      Database security is also an expertise within the broader discipline of  computer security.
                                       For many businesses applications are going mobile that signifies using enterprise data in
                                       mobile context, therefore using a mobile DBMS.
                                      Security is frequently an afterthought, and the database industry is overwhelmed with
                                       sub-standard security, particularly for enterprise databases that are cobbled-together as
                                       an effect of external factors such as business acquisitions.

                                      To be precise, in order to find out exactly which security policies are required, you need to
                                       perform an information risk assessment.

                                   10.7 Keywords

                                   Database: The database is a compilation of  useful data and can  be considered as the  most
                                   essential constituent of an organization and its economic enlargement.
                                   Web-based Databases: Database that are configured to permit external communications from
                                   other web portals face an outstanding data security challenge.

                                   10.8 Review Questions


                                   1.  Explain the concept of database security with examples.
                                   2.  Illustrate the basic principle used for any security workers.
                                   3.  What are the common failures that intimidate database security? Illustrate.

                                   4.  Explain the security traits for an unused DBMS.
                                   5.  Explain why database servers are attacked by hackers.
                                   6.  Describe the need for database security.
                                   7.  Explain the concept of securing mobile databases.
                                   8.  Illustrate the issues related with Enterprise Database Security.

                                   9.  To be precise, in order to find out exactly which security policies are required, you need to
                                       perform an information risk assessment. Comment.
                                   10.  Describe the various policy elements necessary for keeping policies simple and convenient
                                       long term.

                                   Answers: Self  Assessment

                                   1.  corporate                         2.   vulnerabilities
                                   3.  database                          4.   audit trails

                                   5.  global                            6.   enterprise
                                   7.  computer                          8.   mobility
                                   9.  non-mobile                        10.  Multiple
                                   11.  weakest link problem.            12.  security





          150                               LOVELY PROFESSIONAL UNIVERSITY
   151   152   153   154   155   156   157   158   159   160   161