Back to School Offer

Get 20% of Your First Order amount back in Reward Credits!

Get 20% of Your First Orderback in Rewards

All papers examples
Get a Free E-Book! ($50 Value)
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Database Security, Research Paper Example

Pages: 1

Words: 325

Research Paper

Polyinstantiation and Object Resurrection

The strategy that allows multiple instances of a record in the database is Polyinstantiation. These instances point to the same primary key and display different values according to the users of varying security classifications. This is the excellent strategy used for concealing the sensitive information (Alfred, Melissa, Dana & Thomas, 2011). But, this involves falsification of the data and leaves the database inconsistent, which results in great confusion if not properly managed and documented. And also the redundancy required for this strategy consumes wide volume of resources.

Now-a-days the database systems used are object-oriented. These require many objects and takes more time for creation. So the process of recycling the older objects to avoid the object creation-cost is called Object Resurrection. Using this, database security can be enhanced as the number of users involved in creating the objects can be minimized. But in an Object Oriented Database Management System (OODMS) the objects are stored in the database itself reducing the need for reconstruction (Alfred et al., 2011).

Secure Database Architecture

The database architecture is the set of rules, specifications and processes that dictate how data in the database is stored and accessed by components of a system. It describes the organization of data objects and how they work. It affects reliability, scalability, integrity and performance. The most important and the common elements of database architecture are database objects. Objects include rows, columns, views and tables. Access control enhances the database security by assigning rights and privileges to the users and database objects (Murray, 2010). It limits the actions on database objects to specific users. In order to identify who accessed the database objects, database auditing can be used. This cannot prevent, but provides a way to identify the security breaches.

References

  • Alfred Basta, Melissa Zgola, Dana Bullaboy, Thomas L. Whitlock Sr. (2011). Database Security. Cengage Learning.
  • Meg Coffin Murray (2010). Database Security: What students need to know? Journal of University Technology Education: Innovations in Practice. 9, 62-77.
Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Research Paper Samples & Examples

Analysis of Americans With Disabilities Act, Research Paper Example

Introduction Legislators in Congress created and approved the Americans with Disabilities Act (ADA) in 1990, making it a part of US law. This policy aimed [...]

Pages: 11

Words: 3147

Research Paper

Polygamy Practise vs the Nepal Polygamy (Polyandry) Practise, Research Paper Example

Polygamy is referred to as the act of marrying multiple spouses at the same time. The word “polygamy” comes from the Greek for “many marriages.” [...]

Pages: 15

Words: 4223

Research Paper

Mealworms Experiment, Research Paper Example

Mealworms Experiment Conducted by Student at the External University Campus Science Labs Introduction According to Saud and Paudel (2018), pollution is one of the major [...]

Pages: 6

Words: 1567

Research Paper

Exegesis Psalm 1:1-6, Research Paper Example

God’s law on life is central in Psalms, as the author describes a life worth living. The book uses poetic formats to present an eloquent [...]

Pages: 4

Words: 1198

Research Paper

The Impact of Cyber Safety, Research Paper Example

The Impact of Cyber Safety on Educational Outcomes of Secondary School Students Introduction Rationale The internet enables students to access information anytime, anywhere, 24 hours [...]

Pages: 7

Words: 2038

Research Paper

Application of RFID Technology in Reverse Logistics, Research Paper Example

Background/ Introduction Reverse logistics is one of the most challenging aspects of the supply chain. While forward logistics is usually an orderly process, reverse logistics [...]

Pages: 1

Words: 353

Research Paper

Analysis of Americans With Disabilities Act, Research Paper Example

Introduction Legislators in Congress created and approved the Americans with Disabilities Act (ADA) in 1990, making it a part of US law. This policy aimed [...]

Pages: 11

Words: 3147

Research Paper

Polygamy Practise vs the Nepal Polygamy (Polyandry) Practise, Research Paper Example

Polygamy is referred to as the act of marrying multiple spouses at the same time. The word “polygamy” comes from the Greek for “many marriages.” [...]

Pages: 15

Words: 4223

Research Paper

Mealworms Experiment, Research Paper Example

Mealworms Experiment Conducted by Student at the External University Campus Science Labs Introduction According to Saud and Paudel (2018), pollution is one of the major [...]

Pages: 6

Words: 1567

Research Paper

Exegesis Psalm 1:1-6, Research Paper Example

God’s law on life is central in Psalms, as the author describes a life worth living. The book uses poetic formats to present an eloquent [...]

Pages: 4

Words: 1198

Research Paper

The Impact of Cyber Safety, Research Paper Example

The Impact of Cyber Safety on Educational Outcomes of Secondary School Students Introduction Rationale The internet enables students to access information anytime, anywhere, 24 hours [...]

Pages: 7

Words: 2038

Research Paper

Application of RFID Technology in Reverse Logistics, Research Paper Example

Background/ Introduction Reverse logistics is one of the most challenging aspects of the supply chain. While forward logistics is usually an orderly process, reverse logistics [...]

Pages: 1

Words: 353

Research Paper

Get a Free E-Book ($50 in value)

Get a Free E-Book

How To Write The Best Essay Ever!

How To Write The Best Essay Ever!