StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Development of database security - Term Paper Example

Cite this document
Summary
The essay "Development of database security" presented various techniques for implementing security features in a database which can lead an organization to have a logically secured database. Moreover, describes how data should be kept safe from the physical theft threat on the database…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Development of database security
Read Text Preview

Extract of sample "Development of database security"

Development of database security Introduction All the organizations deal with information of the products to be developed / sold and people working in the organization. As the higher management utilizes the information for making informed decisions, therefore, it is one of the crucial assets of the organization. Keeping in view the importance of the information and its enduring usage, it is required that the information needs to be secured and accurately stored in reliable database sources. “Information is an organizational asset, and, according to its value and scope, must be organized, inventoried, secured, and made readily available in a usable format for daily operations and analysis by individuals, groups, and processes, both today and in the future.” (Neilson and Parui, 2009) The database security is one of the non-functional requirements which would only be fulfilled after completing all the functional requirements of the database. One of the reasons for not implementing secured databases is the improper design that does not act in accordance to organizational security policies. This document presents the importance of database security and critically reviews the various reasons for improper security implementation. Moreover, the document provides comprehensive analysis of the techniques and strategies are being utilized to overcome the database security issues (Abramov, Anson, Dahan, Shoval and Sturm, 2012). Database Security The database security is concerned with the unauthorized access or misuse of the authorized user which leads to the leakage of personal or potential information. A database is said to be a reliable data storage source if it does not compromise on confidentiality (data security), integrity (the correctness of data) and availability. The integrity of data is dependent on the data gathering and storing process, moreover, if the database could be accessed by unauthorized users can influence the correctness of data. Therefore, it can be stated that the database security is one of the critical factors to be achieved in developing a dependable database. There are many techniques could be utilized for developing a secured database (Kayarkar, n.d) includes: the access control (implementing data access rights to the users), database monitoring (to review the actions performed on the database), authentication (identifying the accurate user) and encryption (data encoding). Moreover, the data can be made secure by the application security and database integrity controls (Oracle, 2003). Logical and Physical Database Security The Elmasri and Navathe in 2004 a methodology have been introduced for developing a database design. The database designing methodology has following three (3) main phases include: the Conceptual database design, Logical database design, and Physical database design. As the objective of this document s to present a review of the database security concerns for avoiding illegal access, therefore, the document limits the discussion to the logical database design phase. In order to implement the security policies, the logical database design is the most critical phase. The database security can be implemented while designing the database and developing the software application. There are certain techniques need to be implemented for the development of a secured database. One of the techniques is the general security specification technique that can be implemented using Unified Modeling Language (UML) use cases. In order to implement the user privileges the database designer needs to implement the access control specification technique. One of the limitations of these techniques include these methods do not have provisions to tackle the organizational security policy. Keeping in view the limitations, a new security model has been suggested in which the database designers can implement the organizational security policy patterns which would be implemented while application development. In the design phase the database designers can develop security constraints following organizational policy. The implementation phase deals with transforming the data model in the Structured Query Language (SQL) with already developed security constraints (Abramov, Anson, Dahan, Shoval and Sturm, 2012). There are various principals identified and needs to be followed for protecting the data from the illegitimate access of users. The first principal converses for gathering the information about the data to be stored in the database. In order to comply the principal several questions need to be answered and these include: what, whose, why and how the personal data are being processed by the data controller. It would help the data controller to know whether the data under processing is sensitive or not. It is worthwhile to identify and nominate the data protection officer to fix responsibilities and accountability. The second principal states about analyzing the data to investigate whether the data is gathered obeying the laws, moreover, it identifies the criterion for legitimacy. The third principal presents the implementation techniques while maintaining compliance with the principals. It is pertinent to know privacy statements, secret company documents, and scripts. The fourth principal guides to develop a strong relationship with the staff (who has access the personal data), moreover, developing relationship with data processors (an employee for processing data). In the last, the data transfers and data exports should be done while complying the Data Protect Directive and Data Protection Act. The study guides to protect data from the physical unauthorized access while developing relationships with the staff (Room, n.d). Conclusion The correct decisions made on accurate information may lead the organization to success, whereas, the organizations cannot make a correct decision on the faulty information. The database designers are used to develop simply incorrect design just for fulfilling the requirements of the database; however, the designers should also consider the complicated processes of an organization along with security policies. The data should be secured logically as well as conforming to organizational policies and this can be done while designing the database. The document presented various techniques for implementing security features in a database which can lead an organization to have a logically secured database. Moreover, the data should be kept safe from the physical theft threat on the database. There are several counter measures to avoid the physical data theft vulnerability include: the installation of security cameras, alarms, electronic access control implementation on the doors and allocation of security guards (Gergi, 2010). Moreover, there are diverse guidelines and principals to avoid physical data theft which have been discussed in the document. Reference List Abramov, J., Anson, O., Dahan, M., Shoval P., and Sturm, A., 2012. A methodology for integrating access control policies within database development. Computers & Security, SciVerse ScienceDirect, Elsevier Ltd. Elmasri, R., and Navathe, S. B., 2004. Fundamentals of Database Systems. Addison Wesley, pp 58 - 97 Gergi, R. (2010). Logical and Physical Security – What the major Differences Are ? [online] Available at: [Accessed 18 April 2013] Kayarkar, H., n.d. Classification of Various Security Techniques in Databases and their Comparative Analysis. Navi Mumbai: M.G.M’s College of Engineering and Technology Neilson, P., and Parui, U., 2009. Microsoft SQL Server 2008 Bible. CrossPoint Boulevard, Willey Publishing Incorporation Oracle., 2003. Database Security. [online] Available at: [Accessed 17 April 2013] Room, S., n.d. Data Protection and Compliance in Context. Viva, the British Computer Society Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Development of database security Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Development of database security Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1621069-criticall-review-for-secure-database
(Development of Database Security Essay Example | Topics and Well Written Essays - 1000 Words)
Development of Database Security Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1621069-criticall-review-for-secure-database.
“Development of Database Security Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1621069-criticall-review-for-secure-database.
  • Cited: 0 times

CHECK THESE SAMPLES OF Development of database security

Suitability of a relational database structure rather than a spreadsheet table

A database system is an application that is able to store, recover, and manage data very quickly.... Thus, there is a variety of data records for the institute that needs to be stored in the database.... This research is about determining the suitability of a relational database structure over a spreadsheet table for storing and accessing data for a local arts centre.... In this scenario there are two main technology options; we can build a spreadsheet structure for managing these operations or we can develop a relational database system to deal with the operations of the local arts centre....
5 Pages (1250 words) Essay

An Electronic Database

Others include data security, privacy issues, privacy issues and minimum hardware and software requirements of the system that the database will run on.... Secondly, a database offers more security, file cabinets can be compromised, stolen, accidentally destroyed, or be misplaced.... Databases add another level of security to critical information.... It should also allow only authorized users to make changes in the data stored example the trainers should not have the Databases An electronic database is an organized collection of data in a digital form, to achieve a properly working database....
4 Pages (1000 words) Essay

Databases vs. Spreadsheets

However, in case we want to store a lot of data, or if our sharing and security needs are critical, we need to develop a database.... atabases give a wide variety of dimensions of security for instance by user, table and element.... A database is essential for storing banking data, human resource and other similar data where security and efficiency are critical.... I have recommended Oracle Database because it provides to its users some of the excellent capabilities such as scalability, leading performance, security and reliability in all the environments such as Windows, UNIX and Linux....
2 Pages (500 words) Essay

Principles of Information Security

hellip; This report is a product of teamwork with the group members collaborating in the development of the various sections of the report including the selection of the issue-specific policies.... This paper “Principles of information security” analyzes the state of an information system in a company before proposing various issue-specific policies capable of enhancing the efficiency and effectiveness of the system....
9 Pages (2250 words) Essay

The Concept and Benefits of the Database System

 A database scenario is explained in this report to its very length with the entities, attributes, cardinality, assumptions, relationships, and input/output screens.... The concept and benefits of the database system are explained with a detailed analysis of the commercial and non-commercial purposes … Exposure to a case study has finalized the database concepts that are required in a business scenario to capture the information and make good of all the aligning features and technologies provided by the database management systems in order to learn and master the concepts for future benefits to emerge as a database designer   Optimization of queries is done to access multi-dimensional data....
20 Pages (5000 words) Essay

Open-source Database and Proprietary Database

From this paper, it is clear that there are an array of differences between the open-source database and the proprietary database.... An open-source database as the name implies is an organized collection of data that have been structured in such a way.... hellip; This discussion talks that the open-source database can be improved by the users, while it is only the manufacturer of the proprietary database that has the sole right to improve the software....
5 Pages (1250 words) Research Paper

Distributive Database Capabilities Comparison

Definite methods can be employed by BAS to pick up their databases grounds… SQL applications can be enhanced in the BAS Computer using certain tools that can boost the performance of the database employed by Microsoft Corporation.... Other database performance enhancing methodologies usually call for a profile within the system that reports the data obtained and utilized in changing fine directories The Simultaneous multithreading (SMT) processing develops the computer by sustaining cord level parallelism on one superscalar mainframe (Quick Transport Solutions, Inc....
6 Pages (1500 words) Research Paper

The Security Technology Evaluation

This essay "The security Technology Evaluation" focuses on the security technology, the Unsuccessful Logon Attempts, which entails the locking out of accounts due to unsuccessful login attempts.... hellip; This technology is typically core for security administrators who have the responsibility of protecting organizational data.... For the verification process, the security properties for the system are reviewed.... This is best done within the local security settings....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us