Do not let casual detection to your TCP / IP port13
Used to modify the TCP / IP port14
Refuse from the 1434 port probe14
IP restrictions on the network connection14
Other issues in data security management15
SOA security16
The issue of security SOA, It is easy to implement, difficult to manage.20
Why does not WS-Security?21
Basic Concepts25
Encryption27
Signature (Signature)27
Authentication28
Privacy Policy29
Integrity30
Conclusion31
References33
Abstract
In this document we will discuss the basic concept of data security in computer database and the basic information regarding the database security. Before that we will specifically discuss the reason behind the securing the database. Then we will briefly discuss the Microsoft SQL Server 2000. Here we will discuss the secure password policy, account of the use of safety strategies, management extended stored procedure, do not let casual detection to your TCP / IP port, used to modify the TCP / IP port, Refuse from the 1434 port probe and IP restrictions on the network connection. There are some more issues in data management security option that we will discuss ahead. At the end we will conclude the topic in the light of the issues and solution discussed in the whole paper. Then we will discuss the role which SOA security is playing to overcome the problem of database security over wide area network.
Database Security
Introduction
Over the recent years, the database security issue is raised to be one of the biggest issues in any organization or industry. It's the backbone of any company or military enterprise. Today all educational institutes, military and productive organizations are digitizing their rapidly to fetch their necessities efficiently whenever needed. It's also important because all of this data is very important and confidential. It's also important that there should be some sort of security force to protect it from sniffing or harming. From last 30 years the environment of IT has gone through many modifications, the database research community have aimed to remain a step ahead of the forthcoming threats to the database security. The security of the data depends on physical security, OS security and DBMS security. There are many aspects of it that need to be discussed. SOA (Service Oriented Architecture) is also a very demanding solution for database security these days. SOA infrastructures are characterized generally by combining a variety of services to complex business processes from. This creates a high volume of communications with a large number of participating entities. A basic requirement for productive use of such systems is reliable and secure service of communication between service recipients and service providers.
The second layer is the information systems security, system security is usually the threats are as follows hacker intrusion on the database, and steal the information you want. Database system security features for data, including data independence, data security, data integrity, concurrency control, fault recovery. Management system is responsible to avoid concurrent ...