Database Security

Abstract

Database security concerns the increase in the number of reported incidents as per evidenced by growing in terms of loss or unauthorized exposure to the sensitive data . The amount of data is collected, retained and shared by such electronically expands, such that database security is necessary to understand .The US Department of Defense (2004) i.e, The Defense Information Systems Agency in its Database Security Technical Implementation Guide, it basically states that security of database should provide controlling, protecting and access to the basic contents of a database, as well as it also preserve the integrity of data, consistency of data, and overall quality of the data. Students are in the computing disciplines they develop an understanding of the discussed issues and challenges as per related to database security and also they must be able to identify possible more solutions. As the knowledge base related to database security continues to grow, so do the challenges of effectively conveying the material. This paper addresses those challenges by incorporating a set of interactive software modules into each sub-topic. These modules are part of an animated database courseware project designed to support the teaching of database concepts. The courseware covers the domains of Database Design, Structured Query Language, Database Transactions, and Database Security. The Security Module, presented in this paper, allows students to explore such areas as access control, SQL injections, database inference, database auditing, and security matrices.

Authors and Affiliations

Neha Gupta, Jyoti Chandel, Jyoti Yadav

Keywords

Related Articles

Adoption of Information and Communication Technology (ICT) For Development of Indian Agriculture

In India, Agriculture is taken into account to be a primary occupation for a most section of population. We tend to aim to specialize in key factors discovered for effective utilization of knowledge Communication Techno...

Perceptual Colour Image Compression

Perceptual coding technique discriminate the signal components which are detected and not detected by the human eye. There are a number of well accepted perceptual factors which influence the visibility of distortions i...

Analysis of Speed-Flow Relationship of Heterogeneous Traffic – A Case Study of Selected Stretch of Dakor Road

The developing cities have generated the high levels of travel demand by motor vehicles in the cities. This has resulted in changing in nature of traffic characteristics on road network and ultimately it affects the cap...

slugA Review Paper On Firewall

A firewall is a software that establishes a security perimeter whose main task is to block or restrict both incoming and outg oing info rmation over a network. These firewalls are basically...

Imperative Study on WIMAX Technology

Worldwide Interoperability for Microwave Access (WiMAX) is a recent wireless broadband standard that has promised high bandwidth over long-range transmission. The standard specifies the air interface, including the medi...

Download PDF file
  • EP ID EP18783
  • DOI -
  • Views 265
  • Downloads 9

How To Cite

Neha Gupta, Jyoti Chandel, Jyoti Yadav (2014). Database Security. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(9), -. https://europub.co.uk/articles/-A-18783