Back to School Offer

Get 20% of Your First Order amount back in Reward Credits!

Get 20% of Your First Orderback in Rewards

All papers examples
Get a Free E-Book! ($50 Value)
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Standards in Securing Databases, Research Paper Example

Pages: 2

Words: 494

Research Paper

Abstract

In this power point presentation, I will explain the necessity for Database Security in full detail. Furthermore, I would review the research published by Baker, Hylender, Novak, Porter, Sartin, Tippett, and Valentine : The 2009 data breach investigations report, to provide a full overview of the problem and most suitable solutions.

Database security regards computer security, information security, along with risk management. As one of the world’s finest security professionals, I know the standards in securing databases. The ironclad privacy, stability, and accessibility of information security controls that protect databases against jeopardizing and malignant actions, including an assortment of categories, rankings, or models of controls, such as procedural, technical, and administrative, are what generalized Database security protect and promote.

Any likelihood of any damage to the data or the database systems, databases, software applications and functions, the linking of databases and networks should be minimized. I bet that Al Gore, the guy who created the internet in or before 1993, never imagined any reason for this form of viral protection would be needed.

From The 2009 data breach investigations report, here are the “security risks to database systems” for which we need to watch out:

The most common risks associated with database systems are:

  • Unauthorized access from outsiders, such as hackers, as well as misuse of authorization to access databases by employees. This problem can be eliminated by creating access logs on the network and encrypting access codes.
  • Application, backdoor access, unauthorized malware and spyware infections opening the access for the database for unauthorized users. This can cause damage of reputation, data loss and data protection issues, as well. The software installed can erase or publicize data over the Internet, including clients’ information and confidential business documents, as well as cause database faults and malfunction.
  • Overloading the database, as well as the server would make the site and application inaccessible for authorized users.
  • Databases need to be saved and backed up, in order to ensure that no crucial data or information would be lost as a result of climate, accidents, fire or floods. Electricity safety needs to be checked regularly, to ensure that the energy supply of the servers where the data is stored is up to date and safe. It is recommended to update backup files in the end of every working day.
  • The design of the database also needs to be checked for bugs and vulnerabilities, in order to avoid providing easy back door access for unauthorized users, or to eliminate the risk of data loss. Design flaws might also cause data loss, database corruption, degradation of performance and limited accessibility.
  • The process of database administration needs to be evaluated, in order to avoid corruption or loss of data. Bad or invalid commands are able to trigger processes that would make the system vulnerable, inaccessible and open to unauthorized users.

Bibliography

Baker,  W. H.,  Hutton,  A., Hylender,  C. D.,  Novak,  C., Porter,  C., Sartin, B.,  Tippett, P.,  & Valentine,  J. A. The 2009 data breach investigations report (2009).  Verizon Business. Web.22 February 2012

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Research Paper Samples & Examples

What Can Be Learned From the History of the Marshall Plan About the Importance of the United States, Research Paper Example

Introduction After the ending of the Second World War in 1945 Europe was changed forever and began a transformation of re-construction of buildings, culture and [...]

Pages: 8

Words: 2098

Research Paper

What Is the Future of the Canadian Economy as the Government Ends Stimulus Spending, Research Paper Example

Q1 |  Jim Flaherty, The Federal Minister of Finance for the Canadian Government expressed the following economic ideology on the ending of stimulus spending :-  [...]

Pages: 6

Words: 1595

Research Paper

Relationships Between Nursing Concepts, Research Paper Example

Abstract In the field of nursing, the major components come together in an almost limitless number of ways. The nurse, the environment, the state of [...]

Pages: 4

Words: 1091

Research Paper

PepsiCo Supply Chain, Research Paper Example

Abstract Supply chain management is an ongoing process that must constantly be evaluated and adjusted to enable corporations to improve efficiency and decrease costs.  Currently, [...]

Pages: 5

Words: 1432

Research Paper

Hearing-impaired Children, Research Paper Example

When parents have a child with hearing impairment, they are presented with a variety of challenges regarding their child’s social, physical, and academic development.  Hearing [...]

Pages: 10

Words: 2815

Research Paper

Crime Pattern Analysis, Research Paper Example

Abstract Crime Pattern Analysis is discussed within the context of Criminal Justice.  A brief definition exploring the concept of Crime Pattern Analysis and the theoretical [...]

Pages: 3

Words: 782

Research Paper

What Can Be Learned From the History of the Marshall Plan About the Importance of the United States, Research Paper Example

Introduction After the ending of the Second World War in 1945 Europe was changed forever and began a transformation of re-construction of buildings, culture and [...]

Pages: 8

Words: 2098

Research Paper

What Is the Future of the Canadian Economy as the Government Ends Stimulus Spending, Research Paper Example

Q1 |  Jim Flaherty, The Federal Minister of Finance for the Canadian Government expressed the following economic ideology on the ending of stimulus spending :-  [...]

Pages: 6

Words: 1595

Research Paper

Relationships Between Nursing Concepts, Research Paper Example

Abstract In the field of nursing, the major components come together in an almost limitless number of ways. The nurse, the environment, the state of [...]

Pages: 4

Words: 1091

Research Paper

PepsiCo Supply Chain, Research Paper Example

Abstract Supply chain management is an ongoing process that must constantly be evaluated and adjusted to enable corporations to improve efficiency and decrease costs.  Currently, [...]

Pages: 5

Words: 1432

Research Paper

Hearing-impaired Children, Research Paper Example

When parents have a child with hearing impairment, they are presented with a variety of challenges regarding their child’s social, physical, and academic development.  Hearing [...]

Pages: 10

Words: 2815

Research Paper

Crime Pattern Analysis, Research Paper Example

Abstract Crime Pattern Analysis is discussed within the context of Criminal Justice.  A brief definition exploring the concept of Crime Pattern Analysis and the theoretical [...]

Pages: 3

Words: 782

Research Paper

Get a Free E-Book ($50 in value)

Get a Free E-Book

How To Write The Best Essay Ever!

How To Write The Best Essay Ever!