Database Security

Read Complete Research Material



Database Security

Table of Contents

Abstract4

Introduction5

Discussion6

The Early Time (1980)6

My SQL7

Data independence8

Data security8

Data integrity9

Concurrency Control9

Recovery9

SQL server database security policies10

SQL Server Security Configuration10

Use a secure password policy10

Account of the use of safety strategies11

Strengthen the database log records12

Management extended stored procedure12

Use protocol encryption13

Do not let casual detection to your TCP / IP port13

Used to modify the TCP / IP port14

Refuse from the 1434 port probe14

IP restrictions on the network connection14

Other issues in data security management15

SOA security16

The issue of security SOA, It is easy to implement, difficult to manage.20

Why does not WS-Security?21

Basic Concepts25

Encryption27

Signature (Signature)27

Authentication28

Privacy Policy29

Integrity30

Conclusion31

References33

Abstract

In this document we will discuss the basic concept of data security in computer database and the basic information regarding the database security. Before that we will specifically discuss the reason behind the securing the database. Then we will briefly discuss the Microsoft SQL Server 2000. Here we will discuss the secure password policy, account of the use of safety strategies, management extended stored procedure, do not let casual detection to your TCP / IP port, used to modify the TCP / IP port, Refuse from the 1434 port probe and IP restrictions on the network connection. There are some more issues in data management security option that we will discuss ahead. At the end we will conclude the topic in the light of the issues and solution discussed in the whole paper. Then we will discuss the role which SOA security is playing to overcome the problem of database security over wide area network.

Database Security

Introduction

Over the recent years, the database security issue is raised to be one of the biggest issues in any organization or industry. It's the backbone of any company or military enterprise. Today all educational institutes, military and productive organizations are digitizing their rapidly to fetch their necessities efficiently whenever needed. It's also important because all of this data is very important and confidential. It's also important that there should be some sort of security force to protect it from sniffing or harming. From last 30 years the environment of IT has gone through many modifications, the database research community have aimed to remain a step ahead of the forthcoming threats to the database security. The security of the data depends on physical security, OS security and DBMS security. There are many aspects of it that need to be discussed. SOA (Service Oriented Architecture) is also a very demanding solution for database security these days. SOA infrastructures are characterized generally by combining a variety of services to complex business processes from. This creates a high volume of communications with a large number of participating entities. A basic requirement for productive use of such systems is reliable and secure service of communication between service recipients and service providers.

The second layer is the information systems security, system security is usually the threats are as follows hacker intrusion on the database, and steal the information you want. Database system security features for data, including data independence, data security, data integrity, concurrency control, fault recovery. Management system is responsible to avoid concurrent ...
Related Ads