Database Security

Abstract

Database security concerns the increase in the number of reported incidents as per evidenced by growing in terms of loss or unauthorized exposure to the sensitive data . The amount of data is collected, retained and shared by such electronically expands, such that database security is necessary to understand .The US Department of Defense (2004) i.e, The Defense Information Systems Agency in its Database Security Technical Implementation Guide, it basically states that security of database should provide controlling, protecting and access to the basic contents of a database, as well as it also preserve the integrity of data, consistency of data, and overall quality of the data. Students are in the computing disciplines they develop an understanding of the discussed issues and challenges as per related to database security and also they must be able to identify possible more solutions. As the knowledge base related to database security continues to grow, so do the challenges of effectively conveying the material. This paper addresses those challenges by incorporating a set of interactive software modules into each sub-topic. These modules are part of an animated database courseware project designed to support the teaching of database concepts. The courseware covers the domains of Database Design, Structured Query Language, Database Transactions, and Database Security. The Security Module, presented in this paper, allows students to explore such areas as access control, SQL injections, database inference, database auditing, and security matrices.

Authors and Affiliations

Neha Gupta, Jyoti Chandel, Jyoti Yadav

Keywords

Related Articles

Optimization of Drilling Process Parameters: A Review

Drilling is one of the widely used machining processes for various purposes. Now a days it is frequently used in automotive, aircraft and aerospace and dies or mold industries, home appliances, medical and electrical eq...

Cooperative Diversity: A Review

In recent times, because of factors such as signal multi path-propagation and fading the wireless transmissions are sev erely degraded. So in order to avoid such problems in ad-hoc network, cellular network, or WSNs, th...

slugPerformance Enhancement Over Wireless Mobile Adhoc Network

face detection research confronts the full range of challenges found in general purpose, object class recognition. However, the class of faces also has very apparent regularities that are exploited by ma...

Noval Method for Loss Allocation in Radial Distribution Systems

this paper presents an exact method for real power loss allocation to consumers connected to radial distribution networks in a deregulated environment. The proposed method has the advantage that no assumptions are made...

Supply Chain Management: The Role and Issues in the Present and Future

The way the business is done is not same as before and it has undergone radical transformation due to globalization, outsourcing and other vital factors of business entity. Supply chain management has for environmental...

Download PDF file
  • EP ID EP18783
  • DOI -
  • Views 289
  • Downloads 9

How To Cite

Neha Gupta, Jyoti Chandel, Jyoti Yadav (2014). Database Security. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(9), -. https://europub.co.uk/articles/-A-18783