Sunday, June 9, 2019

Database Security Essay Example | Topics and Well Written Essays - 1000 words

Database Security - Essay ExampleThese security controls may be technical, administrative, logical or physical. The vulnerability to the informationbase security include wildcat inlet by hackers or outside attacks or misuse by authorized personnel which are database users, administrators or system managers. A malware infection may shake up unauthorized plan of attack to the database and may compromise its integrity and confidentiality via leakage of details deletion or permanent damage. This may also include denial of access to authorized users or a denial of service attack. Overloads or inefficient performance constraint may compromise database integrity and the data might be susceptible to damage physically (earthquakes, fire, flood) and should be provided with adequate physical protection or have proper backup. Design flaws and invalid data entry buttocks also compromise the integrity and reliability of the database servers. Database Reliability Reliability of a database mea ns that the database provides services for a signifi crouptly long period of time without any fail. It is because database may include data from different sources and a reliable access should be prudent for the database users. Key business data and process information is commonly stored in databases and it is very important of DBMS users to have the data protected so that the data accessed is reliable. For this several security measures can be made in order to prevent databases from losing important data by means of damage or loss (Basta & Zgola. 2011). Database Integrity Database integrity refers to the consistency and the accuracy of data within the database and data warehouse systems. Data integrity is often times dubbed as data quality and data with integrity and a whole structure. There are respective(a) types of data integrity that is associated with databases. Physical integrity of a database refers to the immunity of a database system to physical damages such as power fa ilures, earthquakes, floods etc. and that the database can easily be reconstructed in case of such catastrophe. Logical integrity of a database is equally vital as its physical counterpart and it entails that a database structure must be preserved and it is evident by the logical integrity of the structure when changes to one field do not put a cascading effect on other fields of the database. For example, the data in each element must be accurate, the data is auditable, there is access control for unauthorized personnel, users are correctly identified and the database must be available for the authorized personnel. Auditability of a databases addresses with the monitoring of who or what accesses the data base or has modified the database itself. different data base integrity constraints include referential integrity and domain integrity. To ensure data integrity, data abide bys are first standardized victimisation specific data models or types. For this it is important that the data is complete in its business relations, functions, rules and dates and it is protected. Data integrity can also be implemented through other ways than database security where different error checking and validations must be checked in order to provide accuracy of data. For example, a numerical value in the in a date of hiring cannot be one that is ahead of the system date. In its realization, data

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.