StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Database and Enterprise Application Security - Essay Example

Cite this document
Summary
This paper “Database and Enterprise Application Security” will discuss various issues those need to be considered by the organizations for the protection of business data and information. It will also present some of the basic aspects regarding DBMS system security concerns…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.5% of users find it useful
Database and Enterprise Application Security
Read Text Preview

Extract of sample "Database and Enterprise Application Security"

Database and Enterprise Application Security Latest developments in internet have evolved to an elevated standard of technology. At the present, more and more corporations are making use of the internet in order to carry out their business related tasks. Additionally, the web based systems and business applications have offered better support and facilities for the business and personal level. However, these facilities have also created some concerns regarding web based security and privacy. In this scenario, there is an awful need for implementing proper and appropriate mechanisms in order to ensure internet security. In this paper I will present a deep analysis of some of the important aspects and features of the web based systems. This paper will also discuss various issues those need to be considered by the organizations for the protection of business data and information. This paper will also present some of the basic aspects regarding DBMS system security concerns those need to considered and managed for the effective security management. Introduction Information security remains an extremely significant concern throughout system development life cycle. In other words, it is as imperative as the delivery of the overall system development according to functional requirement. Through the identification of problems and issues near the beginning in the project's initialization phase the operating system, environment, system architecture and database can be designed and integrated with security included features. In addition, it also ensures that system development process followed the rules and regulations, legislation and standards application. This paper presents a detailed analysis of web-security issues which need to be considered by the developers of enterprise web-applications. This paper also outlines fundamental security features offered by database management systems and use of these features in securing the database from security breaches. Need for Web based Security Websites and web applications normally interact and communicate with other back office applications, remote services and distributed systems those are competent to be placed with the range of local premises, locations and facilities at some other location. In this scenario, the difficult to manage and complicated nature of web based system presents the need for better communication among the systems and this aspect leads to a greater likelihood for experiencing security vulnerabilities or weaknesses. This condition initiates elevated chances of the security infringement and do not guarantee the ejection of a stable, well-organized, protected, extensible and fully compatible system (Watson Hall Ltd., 2008), (Turban, Leidner, McLean, & Wetherbe, 2005) and (Laudon & Laudon, 1999). In case of present web based system the security considerations have to be recognized all through the system development life cycle. Additionally, in case of segregation of fundamental security aspects from the overall system development phase will bring about various pessimistic aspects for instance larger expenses, less efficiency of the work done, lesser availability of system resources and substandard system reliability. Thus, in case of web based applications and databases the prime need is the enforcement of data protection strategy which needs to be retained for the implementation of the integrity and confidentiality of the sensitive information as well as accessibility of the services required to be considered at the entire phases of system's life cycle (Watson Hall Ltd., 2008), (Turban, Leidner, McLean, & Wetherbe, 2005) and (Laudon & Laudon, 1999). Web-Security Issues Developers Need To Consider Information system (desktop and web based) security has turned out to be an imperative part of the tactics on which businesses operate and perform various tasks. However, by incorporating and building security measures into software development lifecycle and process, promise to making laws and other security and ethical codes are competent to be attained for better management of business activities and operations. In the below section I will discuss the prime aspects and issues in online/web based systems development which need to be considered by the developers of the web based system. Here are some of the main considerations those need to be acknowledged: Data Security (Spread business data) In case of web based system development, one of the fundamental considerations that need to be confirmed is regarding the better management of critical business data. In this regard we initially need to protect such imperative data from wrong exploitation. In this scenario we need to spread such business data across multiple locations. For instance, Google stores the entire of its client’s data across hundreds of web based server machines, in order to secure business and user data in a proper manner. In addition, there are circumstances wherein banks spread their economic records all through hundreds of server machines that completely support and hold random data and information from users. Moreover, in case of such protection hackers would not be able to cause some serious damage to the business and corporate data (Bilawal Hameed, 2011). Protection against Hacking (Hashing) There are lots of issues and aspects regarding data hacking and pilfering at business websites. In this scenario, a business system developer needs to consider such issues and aspects to comply with the practice and impressive security of the system. For this purpose, one of the top and high quality techniques is the establishment and application of some strong techniques against hacking. At the moment there are lots of hacking techniques those have the power to effectively protect business critical data and information and this arrangement will definitely bring about enhanced business and corporate credibility. In addition, the power hashing systems and techniques are proficiently recognized and lots of efforts and methods are presently available in marketplace for the protection of sensitive data at the corporation (Bilawal Hameed, 2011). Internal Hacks (Password Salts) Password based protection is one of the main concerns in the web based system development. Presently 80 percent of the websites still store passwords in a plain text format which is extremely simple to decode and interpret. In particular such passwords are open to the business administrators and system managers. In this case there exist a great deal of concerns regarding the effective protection and management of internal hacks. In this scenario a password needs to be entered and processed accordingly for decoding by providing a run time user key. This will lead to better management and protection of user’s personal and confidential information and files (Bilawal Hameed, 2011). Proper System Development (Utilize of Code Framework) After the development of complete platform without a PHP framework, it was an extremely poor experience to discover that there was a PHP framework which was easy to study and having latest features of programming. Due to this reason we need to proficiently employ a PHP framework. Additionally, we are able take advantage of the Yii, CodeIgniter or Zend Framework. In addition, regardless of the system development framework we are able to use, it does not matter only if it is some sort of a framework that prevent the overall security errors and without this framework, we could face a lot of security and privacy problems (Bilawal Hameed, 2011). Protection against Attacks (new high-tech technology) Latest information technology systems and tools are more and more protected and free from possible flaws and security attacks. In this scenario there exists a tremendous need for better management of the possible attacks against the network and business systems. There is a dire need for the establishment of a superior protection mechanism for business and corporate data security. In this scenario some new protection and security systems have the potential to offer effective support to the business system. For instance, through the implementation of Secure Socket Layer (SSL) framework at the web based system development we can effectively and strongly enforce system protection and data safety (Bilawal Hameed, 2011) and (Smith, 2004). DBMS Protection Strategy This section discusses some strategies for the protection of Database Management System (DBMS). Additionally, there is a vital need for such protection for the reason that the overall corporate working framework is operational on such databases: Authentication (Correctly Allocated Privileges) While working with system developer or other people who require special access to our website content, do not for all time provide them the complete access or root access to the MySQL server. In its place we have the power to allocate privileges as well as offer them limited access to stop probable disclosure of user accounts those are competent to compromise system security. In this case there is a dire need to develop such mechanism known as authentication designed to control the user access to the systems (Royal Technologies., 2011). Limited access to MySQL database through permitted IP An efficient method to reduce the likelihood of compromising our database security is to confine access to it by means of IP address policies. In this scenario, we require defining our IP address and making use of that address to organize MySQL. Consequently, as additional IP addresses attempt to get admittance to the business and corporate database, this access will be considered as an illegal attempt and the request of access will be denied. Additionally, in order to limit the MYSQL DBMS access we need to make use of effective mechanism for the better protection and management of the access supervision. Thus, we need to define some rules and regulations as well as the levels of system access control to various users (Royal Technologies., 2011). Early finalization of System and DBMS Design Specifications In any corporate or business system application there is a vital need to early confirm the system design specifications. There is as well an imperative need for the better management of the effective DBMS working specifications. Additionally, we need to incorporate better support and facilities for better management of all the specified user requirements so that the system could be effectively managed. For this purpose, we need to effectively normalize all the fundamental aspects so that overall system is designed according to user needs and expectations (Royal Technologies., 2011). Conclusion Security has become an important issue in every aspect of information technology (IT). Thus, organizations need to consider various security aspects before implementing information systems. This paper has presented a comprehensive analysis of some of the important aspects of security and privacy concerns at some networking arrangement. In this scenario I have outlined some of the imperative issues those need to be effectively considered by the developers of the web based systems. After that I have outlined some potential features of the new and popular DBMS applications. References: Bilawal Hameed. (2011). Five Useful Security Tips For Web Developers. Retrieved April 22, 2011, from http://www.bilawal.co.uk/2011/02/five-useful-security-tips-for-web-developers/ Laudon, K. C., & Laudon, J. P. (1999). Management Information Systems, Sixth Edition. New Jersey: Prentice Hall . Royal Technologies. (2011). MySQL Security Tips . Retrieved April 23, 2011, from http://www.royalit.net/index.php?option=com_content&view=article&id=7&Itemid=9 Smith, M. (2004, September 10). Top 10 Web Security Tips. Retrieved April 22, 2011, from ColdFusion Developer's Journal: http://coldfusion.sys-con.com/node/46366 Turban, E., Leidner, D., McLean, E., & Wetherbe, J. (2005). Information Technology for Management: Transforming Organizations in the Digital Economy . New York: Wiley. Watson Hall Ltd. (2008, September 11). Web Site and Web Application Security. Retrieved April 22, 2011, from https://www.watsonhall.com/secure-development-and-compliance/ Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Database and Enterprise Application Security Essay - 1”, n.d.)
Retrieved from https://studentshare.org/information-technology/1416065-database-and-enterprise-application-security
(Database and Enterprise Application Security Essay - 1)
https://studentshare.org/information-technology/1416065-database-and-enterprise-application-security.
“Database and Enterprise Application Security Essay - 1”, n.d. https://studentshare.org/information-technology/1416065-database-and-enterprise-application-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Database and Enterprise Application Security

Relational Database System Design

The current system has been facing some challenges with the structure and the design of its database and the relationship of the data items.... The paper "Relational database System Design" discusses details about the companies that use the ECT strategy and the challenges, which the organizations face.... The database layout shows a variety of products and services, which the organization adopting the system will be able to operate in.... The immediately noticeable challenge with the database is the use of important database elements, such as primary keys, foreign keys, and the relationships....
4 Pages (1000 words) Admission/Application Essay

Application Personal Statement - Directions in in the instruction box below

In fourth grade I decided to design my first optimization database in order to maximize my wardrobe options from my current selection.... s it might be obvious from the use of a database for a wardrobe, my interests spread over a broad spectrum of topics, which made Colgate University a good match for me.... I taught myself: HTML for web pages; VBA for Microsoft Excel calculations; and, SQL for database reporting....
2 Pages (500 words) Admission/Application Essay

Common Application Form

Another compelling reason for my choosing this line of activity is that my father runs a lucrative business enterprise, which I am determined to… These exemplary and essential traits were provided to me in ample measure, during my venture into sports.... I have been actively involved in a variety of sports First, I was active in my school soccer team up to the 11th grade....
3 Pages (750 words) Admission/Application Essay

Experience Maintaining Databases

Most of all, I made them understand system requirements, system functionality and technical usage regarding application security.... I loved working with users and satisfying their queries regarding application questions.... I helped them in creating application accounts.... I helped them retrieve their information from the application....
1 Pages (250 words) Admission/Application Essay

The Importance of iCloud Computing System

In this assessment, therefore I strive to decipher the importance of icloud computing system.... As such, I maintain the use of technical terms in order to enhance… In the four outcomes below, I present my findings from the review of the technical article.... The technology uses the virtual space to act as an additional storage medium for those using different types of digital media....
6 Pages (1500 words) Admission/Application Essay

Security Best Practice Guidelines for Businesses

The author of this essay entitled "security Best Practice Guidelines for Businesses" touches upon the Intrusion Detection System (IDS) which is a critical precautionary tool that monitors the network through monitoring packets that are passed within users.... hellip; The first and easiest application of an Intrusion Detection Systems for security purposes is known as application isolation.... One of the most interesting tools that provide Optimum security is known as Secunia PSI....
4 Pages (1000 words) Admission/Application Essay

Impact of Ubiquitous Sensors

In addition, it steers database date away from being it making the object relate to the individual personally.... It also offers knowledge to everyone, anywhere and at any time.... The context awareness helps in data generation.... Ubiquity anywhere is very practical in a… In a case where USN is under consideration to offer services everywhere, it applies to both civilians and the military fields....
4 Pages (1000 words) Admission/Application Essay

Economics of Multinational Enterprise

The paper “Economics of Multinational enterprise” looks at the developed countries with abundant capital in their possession.... The developing countries will opt to choose a good that will demand more labor that capital so as to utilize the natural advantage in hand....
6 Pages (1500 words) Admission/Application Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us