StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Database Security and Privacy Principles - Essay Example

Cite this document
Summary
The paper "Database Security and Privacy Principles" tells us about standards, security, and compliance policies. Conduct vulnerability and configuration assessments. Identify excessively privileged user accounts…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.5% of users find it useful
Database Security and Privacy Principles
Read Text Preview

Extract of sample "Database Security and Privacy Principles"

Personal information (PI) could be gathered, held, and used for many different purposes and through different methods. Once the information has been collected, various legal and ethical issues govern the right access to such information. Some information is deemed to be confidential and this means that third parties may not acquire it legally (Doyle & Bagaric, 2005). Several laws relating to database security and privacy have been promulgated in different countries across the world. Database security entails the protection of collected information. If this is not done, then databases are subjected to several threats that could lead to loss of integrity, loss of availability, and loss of confidentiality (IFIP, 2013).

Privacy protection is both a personal and fundamental right for any individual. It is the right of every individual to hold the expectation that organizations that collect information will ensure the confidentiality of personal information. One way in which this can be achieved is by ensuring that organizations will collect, maintain, utilize, and disseminate personal information and data only to the extent that is necessary to enable them to perform their functions (Doyle & Bagaric, 2005).

Privacy laws regulate how entities handle personal information. They also include obligations that govern the collection, use, disclosure, and access to personal information, requiring entities to observe reasonable measures for the protection of personal information in their possession from misuse, loss, and from unauthorized access, use, modification, or disclosure.

The NIST triad for privacy is set under the above set of requirements for privacy. It is a model for information security that incorporates three main components namely confidentiality, integrity, and availability. Each of these components in the triad stresses a key objective for information security. Confidentiality requires that data is only availed to appropriate parties, integrity means the certainty that there is no tampering with the data prior to and after collection, and availability means that the data will be made available as and when needed (Nemati, 2008).

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Database security Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Database security Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1691888-database-security
(Database Security Essay Example | Topics and Well Written Essays - 250 Words)
Database Security Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1691888-database-security.
“Database Security Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1691888-database-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Database Security and Privacy Principles

Principles of Direct and Database Marketing

This essay "principles of Direct and Database Marketing" focuses on the traditional and conventional approach to marketing that has been epitomized and framed in the concept of the 'Four Ps' of marketing for decades, which are product, price, place, and promotion.... The extent of the privacy issues and concerns presented by direct marketing implies that marketers, governments, and consumers have to come together to curb the augmentation of privacy issues that are raised by direct marketing and online marketing....
11 Pages (2750 words) Essay

Security and Privacy in the Network Context

In the paper 'security and privacy in the Network Context,' the author argues that database security is often disregarded by companies that provide more priority on operating systems and network stability.... ong-Term Network and Data Security, and privacy RightsThere are many ways to secure access to vital information in a Network, Database, and Individual Private files.... The author states that the key to database security is access control....
2 Pages (500 words) Essay

Relational database solution

Information helps in the planning as well as forecasting for the future in a business Relational database Solution Introduction It has been official for quite a while that we are living in a technological age.... One very well known model for database management is the rational database solution.... The relational database management system is based on the relational model theory.... A relational database model has a set of tables which are designed to hold data after collection....
2 Pages (500 words) Essay

Development of database security

Moreover, the data can be made secure by the application security and database integrity controls.... The essay "Development of database security" presented various techniques for implementing security features in a database which can lead an organization to have a logically secured database.... The database security is concerned with the unauthorized access or misuse of the authorized user which leads to the leakage of personal or potential information....
4 Pages (1000 words) Term Paper

High-Quality Distributed Database Systems

To be precise, having a well-organized database system is always an essential aspect particularly in promoting data privacy, security, and availability in any business environment.... The paper "High-Quality Distributed Database Systems" highlights that the security components in the databases focus mainly on the general aspect of security enhancement but do not specify methodologies to be used in guaranteeing the ACID properties of database transactions....
4 Pages (1000 words) Research Paper

Principles of Information Security

This paper 'principles of information security' analyzes the state of an information system in a company before proposing various issue-specific policies capable of enhancing the efficiency and effectiveness of the system.... Information policies influence the nature of the information systems in a company....
9 Pages (2250 words) Essay

Privacy of Data at Web Server

he national privacy principles are created to be used in the regulation of how private organizations and institutions manage personal and individual information.... The author of the "privacy of Data at Web Server" paper argues that the institution needs proper management of the database, this will involve the employment of personnel and an upgrade of the database management system to a more robust and updated version.... This poses a threat to personal and individual privacy of data and information....
12 Pages (3000 words) Assignment

Exposure of Patient Data to the Media

"Exposure of Patient Data to the Media" paper views information and privacy systems and the risks that evolved after the exposure of sensitive Patient's data to the media in the COVID-19 unit.... In the management of COVID-19, technology stores the Patient's data provides digital communication and network security; therefore, technology can significantly impact the Patient's privacy and the HIPAA standards.... Storage of Patient's data will vary according to the organization, the type of data, and the amount to have opted for patients' privacy and HIPAA compliance of data storage options....
5 Pages (1250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us