Self-Protection against Insider Threats in DBMS through Policies Implementation

Abstract

In today’s world, information security of an organization has become a major challenge as well as a critical business issue. Managing and mitigating these internal or external security related issues, organizations hire highly knowledgeable security expert persons. Insider threats in database management system (DBMS) are inherently a very hard problem to address. Employees within the organization carry out or harm organization data in a professional manner. To protect and monitor organization information from insider user in DBMS, the organization used different techniques, but these techniques are insufficient to secure their data. We offer an autonomous approach to self-protection architecture based on policy implementation in DBMS. This research proposes an autonomic model for protection that will enforce Access Control policies, Database Auditing policies, Encryption policies, user authentication policies, and database configuration setting policies in DBMS. The purpose of these policies to restrict insider user or Database Administrator (DBA) from malicious activities to protect data.

Authors and Affiliations

Farukh Zaman, Basit Raza, Ahmad Kamran Malik, Adeel Anjum

Keywords

Related Articles

The Role of Technical Analysis Indicators over Equity Market (NOMU) with R Programing Language

The stock market is a potent, fickle and fast-changing domain. Unanticipated market occurrences and unstructured financial information complicate predicting future market responses. A tool that continues to be advantageo...

Single-Handed Cursor Control Technique Optimized for Rear Touch Operation and Its Usability

To improve single-handed operation of mobile de-vices, the use of rear touch panel has potential for user interac-tions. In this paper, a basic study of operational control simply achieved through drag and tap of the ind...

A Novel Ball on Beam Stabilizing Platform with Inertial Sensors

This research paper presents dynamic modeling of inertial sensor based one degree of freedom (1-DoF) stabilizing platform. Plant is a ball on a pivoted beam. Nonlinear modeling of the plant is done. Ball position on beam...

  Improved Face Recognition with Multilevel BTC using Kekre’s LUV Color Space

 The theme of the work presented in the paper is Multilevel Block Truncation Coding based Face Recognition using the Kekre’s LUV (K’LUV) color space. In [1], Multilevel Block Truncation Coding was applied on the RGB...

The SNCD as a Metrics for Image Quality Assessment

In our era, when we have a lot of instrument to capture digital images and they go more in more increasing the image resolution; the quality of the images become very important for different application, and the developm...

Download PDF file
  • EP ID EP249865
  • DOI 10.14569/IJACSA.2017.080334
  • Views 78
  • Downloads 0

How To Cite

Farukh Zaman, Basit Raza, Ahmad Kamran Malik, Adeel Anjum (2017). Self-Protection against Insider Threats in DBMS through Policies Implementation. International Journal of Advanced Computer Science & Applications, 8(3), 239-249. https://europub.co.uk/articles/-A-249865