Wednesday, April 24, 2019

Criticall review for secure Database Essay Example | Topics and Well Written Essays - 1000 words

Criticall re mess for secure Database - Essay ExampleOne of the reasons for non implementing secured databases is the improper design that does not act in accordance to organizational tribute policies. This document presents the enormousness of database bail and critically reviews the various reasons for improper security implementation. Moreover, the document provides comprehensive analysis of the proficiencys and strategies are macrocosm utilized to overcome the database security issues (Abramov, Anson, Dahan, Shoval and Sturm, 2012). Database Security The database security is concerned with the unauthorized access or revile of the authorized user which leads to the leakage of personal or potential information. A database is said to be a reliable data storage source if it does not compromise on confidentiality (data security), justice (the correctness of data) and availability. The law of data is dependent on the data gathering and storing process, moreover, if the database could be accessed by unauthorized users can find out the correctness of data. ... Moreover, the data can be made secure by the application security and database integrity controls (Oracle, 2003). Logical and Physical Database Security The Elmasri and Navathe in 2004 a methodology have been introduced for developing a database design. The database plan methodology has following three (3) main phases accept the Conceptual database design, Logical database design, and Physical database design. As the design of this document s to present a review of the database security concerns for avoiding illegal access, therefore, the document limits the discussion to the crystalline database design phase. In array to implement the security policies, the logical database design is the most critical phase. The database security can be implemented while designing the database and developing the software application. There are certain techniques need to be implemented for the development of a secured database. One of the techniques is the general security specification technique that can be implemented using Unified Modeling Language (UML) use cases. In order to implement the user privileges the database designer needs to implement the access control specification technique. One of the limitations of these techniques include these methods do not have provisions to tackle the organizational security insurance policy. Keeping in view the limitations, a new security model has been suggested in which the database designers can implement the organizational security policy patterns which would be implemented while application development. In the design phase the database designers can develop security constraints following organizational policy. The

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.