Self-Protection against Insider Threats in DBMS through Policies Implementation

Abstract

In today’s world, information security of an organization has become a major challenge as well as a critical business issue. Managing and mitigating these internal or external security related issues, organizations hire highly knowledgeable security expert persons. Insider threats in database management system (DBMS) are inherently a very hard problem to address. Employees within the organization carry out or harm organization data in a professional manner. To protect and monitor organization information from insider user in DBMS, the organization used different techniques, but these techniques are insufficient to secure their data. We offer an autonomous approach to self-protection architecture based on policy implementation in DBMS. This research proposes an autonomic model for protection that will enforce Access Control policies, Database Auditing policies, Encryption policies, user authentication policies, and database configuration setting policies in DBMS. The purpose of these policies to restrict insider user or Database Administrator (DBA) from malicious activities to protect data.

Authors and Affiliations

Farukh Zaman, Basit Raza, Ahmad Kamran Malik, Adeel Anjum

Keywords

Related Articles

A New Artificial Neural Networks Approach for Diagnosing Diabetes Disease Type II

Diabetes is one of the major health problems as it causes physical disability and even death in people. Therefore, to diagnose this dangerous disease better, methods with minimum error rate must be used. Different models...

SOM Based Visualization Technique For Detection Of Cancerous Masses In Mammogram 

Breast cancer is the most common form of cancer in women. An intelligent computer-aided diagnosis system can be very helpful for radiologist in detecting and diagnosing micro calcifications patterns earlier and faster th...

A Survey of Unstructured Text Summarization Techniques

Due to the explosive amounts of text data being created and organizations increased desire to leverage their data corpora, especially with the availability of Big Data platforms, there is not usually enough time to read...

A Multi-Attribute Decision Making for Electrician Selection using Triangular Fuzzy Numbers Arithmetic Approach

This study uses an approach of fuzzy multi attribute decision making in determining alternatives to solve the selection problem of the electrician through a competency test. Competency test consists of several tests of k...

Processing the Text of the Holy Quran: a Text Mining Study

The Holy Quran is the reference book for more than 1.6 billion of Muslims all around the world Extracting information and knowledge from the Holy Quran is of high benefit for both specialized people in Islamic studies as...

Download PDF file
  • EP ID EP249865
  • DOI 10.14569/IJACSA.2017.080334
  • Views 66
  • Downloads 0

How To Cite

Farukh Zaman, Basit Raza, Ahmad Kamran Malik, Adeel Anjum (2017). Self-Protection against Insider Threats in DBMS through Policies Implementation. International Journal of Advanced Computer Science & Applications, 8(3), 239-249. https://europub.co.uk/articles/-A-249865