Database Security
Database security involves protecting the database from unauthorized access, modification, or destruction. Since the database represents an essential corporate resource, database security is an important subcomponent of any organization's overall information systems security plan.
Security threats are events or situations that could harm the system by compromising privacy or confidentiality, or by damaging the database itself. Security threats can occur either accidentally or deliberately.
1. List at least 3 examples of accidental security violations and then suggest 3 actions to minimize the accidental threats.
2. List at least 3 examples of deliberate security violations and then suggest 3 actions to combat the deliberate threats.
Database Security Database security involves protecting the database from unauthorized access, modification, or destruction. Since the...
Attacks: Passive – attempt to learn or make use of information from the system that does not affect system resources • Active – attempt to alter system resources or affect their operation • Insider – initiated by an entity inside the security parameter • Outsider – initiated from outside the perimeter Threat Consequences Unauthorized disclosure is a threat to confidentiality •Exposure: This can be deliberate or be the result of a human, hardware, or software error •Interception: unauthorized access to...