StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Explain database security issues - Essay Example

Cite this document
Summary
Metadata illustrates the quality, content, condition, as well as other features concerning data inscribe in an ordinary FGDC layout. The role of metadata is helping individuals in locating, as well as understanding,…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.2% of users find it useful
Explain database security issues
Read Text Preview

Extract of sample "Explain database security issues"

College: Explain Database Security Issues What is Metadata? Metadata refers to the data used in of other data. Metadata illustrates the quality, content, condition, as well as other features concerning data inscribe in an ordinary FGDC layout. The role of metadata is helping individuals in locating, as well as understanding, data. It also offers the history of given data by describing the data’s structure and content, its generator and preserver, its time of collection and publication, its geographic or storage location, reason for its creation, and means of producing, processing, or modelling it (Cox et al, 2012).

A Concurrent Update A concurrent update refers to the situation in which more than one user make an update to one database within the same time (Pratt & Adamski, 2011). Locking and What it Accomplishes Locking refers to the means of synchronization of potentially simultaneous database or even other ordinary resource’s utilization. In operating systems, locking helps in enforcing and ascertaining the occurrence of events in the appropriate series (Pratt & Adamski, 2011). Encryption and Relation to Security As the most effective means of enhancing security of data, encryption refers to the translation of data into ciphertext form, which cannot be understood easily by illicit individuals.

Therefore, encryption involves the conversion of essential data into secret codes. Encrypted data is sent in codes instead of plain, simple words making it necessary for the receiver’s computer to decrypt such data for one’s display. The reader of such data requires a secret password or key to enhance decryption of the data (Pratt & Adamski, 2011).Use of Views in Improving Security Views refer to the saved select statements, which permit an individual to work upon the outcomes returned from them.

Views are essential in provision of column- or row-level data access, wrapping up sophisticated joints, executing sophisticated collective queries, and tailoring data display (Singh & Kanjilal, 2009). Views are fundamental security tools, habitually utilized in thwarting users from having unrestricted access to tables whereas permitting them to operate with the presented data. All consents can be eradicated from the principal tables, and provided the table’s owner is the view’s owner, the user will have the ability of interacting with the given data, but based on authorizations approved to the view (Pratt & Adamski, 2011).

What is Replication? Duplication (replication) refers to a set of catalog objects and data copying and distribution technologies from a given folder into another. This is followed by the sychronization between the two databases in order to uphold uniformity. In the process, a database is copied from one server into another, followed by protection of the dissimilar copies in concurrence. Data replication, on the other hand, denotes copying of a given set of data from one data site into another during replication of data (Pratt & Adamski, 2011).

What is Synchronization? Sychronization refers to the process via which DPM (data protection manager) shifts data alterations into DPM servers from protected file servers, followed by the application of such changes in duplication of protected data. It is a precise process of toning or orchestrating multiple devices, processes, or activities in time. Synchronization takes place when mobile devices correspond with a server or personal computer’s applications. The DPM depends on synchronization in order to maintain the synchronization of the copies with the cosseted data on file servers (Singh & Kanjilal, 2009).

ReferencesCox, M., Mulder, E., & Tadic, L. (2012). Descriptive Metadata for Television: An End-to-End Introduction. London: CRC Press.Pratt, P.J., & Adamski, J.J (2011). Concepts of Database Management. London: Cengage Learning. Singh, R., & Kanjilal, J. (2009). Pro Sync Framework. Berkeley, CA: Apress.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Explain database security issues Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Explain database security issues Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1619583-explain-database-security-issues
(Explain Database Security Issues Essay Example | Topics and Well Written Essays - 500 Words)
Explain Database Security Issues Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1619583-explain-database-security-issues.
“Explain Database Security Issues Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1619583-explain-database-security-issues.
  • Cited: 0 times

CHECK THESE SAMPLES OF Explain database security issues

Database and Enterprise Application Security

This paper presents a detailed analysis of web-security issues which need to be considered by the developers of enterprise web-applications.... This paper “Database and Enterprise Application Security” will discuss various issues those need to be considered by the organizations for the protection of business data and information.... Through the identification of problems and issues near the beginning of the projects initialization phase the operating system, environment, system architecture, and database can be designed and integrated with security included features....
7 Pages (1750 words) Essay

Security Issues Within Virtualization

Virtualization security issues/MethodologyIV.... Security levels and issues are the first thing on most virtualization users' minds.... Cloud Computing – issues, Research and Implementations.... This paper discusses the concept of “cloud” computing, some of the issues it tries to address, related research topics, and a “cloud” implementation available today.... Cloud Computing – issues, Research and Implementations....
2 Pages (500 words) Coursework

The Security Risks Associated with Online Access to Databases

The essay “The security Risks Associated with Online Access to Databases” focuses on databases, which usually contain sensitive information yet security is often lacking to protect them.... hellip; The author states that database administrators and application developers usually don't know much about security while security personnel usually don't know much about the needs of database users.... This leads to only minimal security if any, despite regulations requiring organizations to secure their data....
2 Pages (500 words) Essay

Database security issues

However, with the growth in database systems' demand, security issues concerning the safety of… This paper seeks to discuss some of the database security issues that are threaten to compromise the information stored by organizations.... There has been a rapid growth uptake of cloud computing and hence database systems that are web The paper analyzes security issues concerning both web based and traditional databases.... Database inference is a security issue that multi level databases are prone to....
5 Pages (1250 words) Research Paper

Technology Evaluation - Bank Solutions Inc

Security concerns also establishes the need for applications that can guarantee security issues such as authenticity, privacy, and confidentiality and legal… Bank Solutions Inc.... offers item processing services, such as in-clearing and Proof of Deposit (POD) processing, item capture, return and exception item processing, and image archive storage and retrieval, Analysis of its environment identifies diversified issues such as security and technology issues, operational issues, and interoperability issues and development of an application of Oracle database is one of the recommended security measures against the issues....
5 Pages (1250 words) Case Study

The Concept and Benefits of the Database System

 A database scenario is explained in this report to its very length with the entities, attributes, cardinality, assumptions, relationships, and input/output screens.... The concept and benefits of the database system are explained with a detailed analysis of the commercial and non-commercial purposes … Exposure to a case study has finalized the database concepts that are required in a business scenario to capture the information and make good of all the aligning features and technologies provided by the database management systems in order to learn and master the concepts for future benefits to emerge as a database designer   Optimization of queries is done to access multi-dimensional data....
20 Pages (5000 words) Essay

Distributive Database Capabilities Comparison

Definite methods can be employed by BAS to pick up their databases grounds… SQL applications can be enhanced in the BAS Computer using certain tools that can boost the performance of the database employed by Microsoft Corporation.... Other database performance enhancing methodologies usually call for a profile within the system that reports the data obtained and utilized in changing fine directories The Simultaneous multithreading (SMT) processing develops the computer by sustaining cord level parallelism on one superscalar mainframe (Quick Transport Solutions, Inc....
6 Pages (1500 words) Research Paper

The Concept of Password Management

The paper focuses on the concept of password management and how to solve the issues of having so many passwords and having to change them for the different applications at the workplace.... Additionally, due to the vast usage of passwords for online authentication services at the workplace, there is an increasing threat about the vulnerability of these passwords, which pose a security threat to the employee/worker, and the organization.... The problems emanating from password management, as stated above, compromise employee and organization security, lead to lost productivity as a result of time wastage, and expensive delays....
9 Pages (2250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us