CINXE.COM

Database Security in a Dynamic IT world

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <title>Database Security in a Dynamic IT world</title> <!-- common meta tags --> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta http-equiv="X-UA-Compatible" content="ie=edge"> <meta name="title" content="Database Security in a Dynamic IT world"> <meta name="description" content="Databases are vulnerable. Public statements by Target, Home Depot, and Anthem following their extremely advertised data breaches are each uniform and succinct on how their breaches unfolded: unauthorized access to those systems that ultimately led to the extraction of sensitive information. A comprehensive strategy to secure a database is over data security. Usually, security events will be related to the later action: illegitimate access to data confidentiality damage, injury to the integrity of knowledge, loss of data accessibility (Discover). Loss of privacy of data, creating them accessible to others without a right of access is not visible within the database and does not need changes deductible database. This paper addresses these events to confirm database security"/> <meta name="keywords" content="Data Security, Database, Data Integrity, Data Science, Information Technology"/> <!-- end common meta tags --> <!-- Dublin Core(DC) meta tags --> <meta name="dc.title" content="Database Security in a Dynamic IT world"> <meta name="citation_authors" content="Yilin Chen"> <meta name="citation_authors" content="Yu Sun"> <meta name="dc.type" content="Article"> <meta name="dc.source" content="Computer Science & Information Technology (CS & IT) Vol. 11, No.16"> <meta name="dc.date" content="2021/10/30"> <meta name="dc.identifier" content="10.5121/csit.2021.111614"> <meta name="dc.publisher" content="AIRCC Publishing Corporation"> <meta name="dc.rights" content="http://creativecommons.org/licenses/by/3.0/"> <meta name="dc.format" content="application/pdf"> <meta name="dc.language" content="en"> <meta name="dc.description" content="Databases are vulnerable. Public statements by Target, Home Depot, and Anthem following their extremely advertised data breaches are each uniform and succinct on how their breaches unfolded: unauthorized access to those systems that ultimately led to the extraction of sensitive information. A comprehensive strategy to secure a database is over data security. Usually, security events will be related to the later action: illegitimate access to data confidentiality damage, injury to the integrity of knowledge, loss of data accessibility (Discover). Loss of privacy of data, creating them accessible to others without a right of access is not visible within the database and does not need changes deductible database. This paper addresses these events to confirm database security."/> <meta name="dc.subject" content="Data Security"> <meta name="dc.subject" content="Database"> <meta name="dc.subject" content="Data Integrity"> <meta name="dc.subject" content="Data Science"> <meta name="dc.subject" content="Information Technology"> <!-- End Dublin Core(DC) meta tags --> <!-- Prism meta tags --> <meta name="prism.publicationName" content="Computer Science & Information Technology (CS & IT)"> <meta name="prism.publicationDate" content="2021/10/30"> <meta name="prism.volume" content="11"> <meta name="prism.number" content="16"> <meta name="prism.section" content="Article"> <meta name="prism.startingPage" content="163"> <!-- End Prism meta tags --> <!-- citation meta tags --> <meta name="citation_journal_title" content="Computer Science & Information Technology (CS & IT)"> <meta name="citation_publisher" content="AIRCC Publishing Corporation"> <meta name="citation_authors" content="Yilin Chen and Yu Sun"> <meta name="citation_title" content="Database Security in a Dynamic IT world"> <meta name="citation_online_date" content="2021/10/30"> <meta name="citation_issue" content="11"> <meta name="citation_firstpage" content="163"> <meta name="citation_authors" content="Yilin Chen"> <meta name="citation_authors" content="Yu Sun"> <meta name="citation_doi" content="10.5121/csit.2021.111614"> <meta name="citation_abstract_html_url" content="https://aircconline.com/csit/abstract/v11n16/csit111613.html"> <meta name="citation_pdf_url" content="https://aircconline.com/csit/papers/vol11/csit111614.pdf"> <!-- end citation meta tags --> <!-- Og meta tags --> <meta property="og:site_name" content="AIRCC" /> <meta property="og:type" content="article" /> <meta property="og:url" content="https://aircconline.com/csit/abstract/v11n16/csit111613.html"> <meta property="og:title" content="Database Security in a Dynamic IT world"> <meta property="og:description" content="Databases are vulnerable. Public statements by Target, Home Depot, and Anthem following their extremely advertised data breaches are each uniform and succinct on how their breaches unfolded: unauthorized access to those systems that ultimately led to the extraction of sensitive information. A comprehensive strategy to secure a database is over data security. Usually, security events will be related to the later action: illegitimate access to data confidentiality damage, injury to the integrity of knowledge, loss of data accessibility (Discover). Loss of privacy of data, creating them accessible to others without a right of access is not visible within the database and does not need changes deductible database. This paper addresses these events to confirm database security."/> <!-- end og meta tags --> <!-- INDEX meta tags --> <meta name="google-site-verification" content="t8rHIcM8EfjIqfQzQ0IdYIiA9JxDD0uUZAitBCzsOIw" /> <meta name="yandex-verification" content="e3d2d5a32c7241f4" /> <!-- end INDEX meta tags --> <link rel="icon" type="image/ico" href="../img/ico.ico"/> <link rel="stylesheet" type="text/css" href="../main1.css" media="screen" /> <style type="text/css"> a{ color:white; text-decoration:none; line-height:20px; } ul li a{ font-weight:bold; color:#000; list-style:none; text-decoration:none; size:10px;} .imagess { height:90px; text-align:left; margin:0px 5px 2px 8px; float:right; border:none; } #left p { font-family: CALIBRI; font-size: 16px; margin-left: 20px; font-weight: 500; } .right { margin-right: 20px; } #button{ float: left; font-size: 14px; margin-left: 10px; height: 28px; width: auto; background-color: #1e86c6; } </style> </head> <body> <div class="font"> <div id="wap"> <div id="page"> <div id="top"> <form action="https://airccj.org/csecfp/library/Search.php" method="get" target="_blank" > <table width="100%" cellspacing="0" cellpadding="0" > <tr class="search_input"> <td width="665" align="right">&nbsp;</td> <td width="236" > <input name="title" type="text" value="Enter the paper title" class="search_textbox" onclick="if(this.value=='Enter the paper title'){this.value=''}" onblur="if(this.value==''){this.value='Enter the paper title'}" /> </td> <td width="59"> <input type="image" src="../img/go.gif" /> </td> </tr> <tr> <td colspan="3" valign="top"><img src="../img/top1.gif" alt="Academy & Industry Research Collaboration Center (AIRCC)" /></td> </tr> </table> </form> </div> <div id="font-face"> <div id="menu"> <a href="http://airccse.org">Home</a> <a href="http://airccse.org/journal.html">Journals</a> <a href="http://airccse.org/ethics.html">Ethics</a> <a href="http://airccse.org/conference.html">Conferences</a> <a href="http://airccse.org/past.html">Past&nbsp;Events</a> <a href="http://airccse.org/b.html">Submission</a> </div> <div id="content"> <div id="left"> <h2 class="lighter"><font size="2">Volume 11, Number 16, October 2021</font></h2> <h4 style="text-align:center;height:auto;"><a>Database Security in a Dynamic IT world</a></h4> <h3>&nbsp;&nbsp;Authors</h3> <p class="#left right" style="text-align:">Temitope-Awodiji, California Miramar University, USA</p> <h3>&nbsp;&nbsp;Abstract</h3> <p class="#left right" style="text-align:justify">Databases are vulnerable. Public statements by Target, Home Depot, and Anthem following their extremely advertised data breaches are each uniform and succinct on how their breaches unfolded: unauthorized access to those systems that ultimately led to the extraction of sensitive information. A comprehensive strategy to secure a database is over data security. Usually, security events will be related to the later action: illegitimate access to data confidentiality damage, injury to the integrity of knowledge, loss of data accessibility (Discover). Loss of privacy of data, creating them accessible to others without a right of access is not visible within the database and does not need changes deductible database. This paper addresses these events to confirm database security. </p> <h3>&nbsp;&nbsp;Keywords</h3> <p class="#left right" style="text-align:justify">Data Security, Database, Data Integrity, Data Science, Information Technology.</p><br> <button type="button" id="button"><a target="blank" href="/csit/papers/vol11/csit111613.pdf">Full Text</a></button> &nbsp;&nbsp;<button type="button" id="button"><a href="http://airccse.org/csit/V11N16.html">Volume 11, Number 16</a></button> <br><br><br><br><br> </div> <div id="right"> <div class="menu_right"> <ul> <li id="id"><a href="http://airccse.org/editorial.html">Editorial Board</a></li> <li><a href="http://airccse.org/arch.html">Archives</a></li> <li><a href="http://airccse.org/indexing.html">Indexing</a></li> <li><a href="http://airccse.org/faq.html" target="_blank">FAQ</a></li> </ul> </div> <div class="clear_left"></div> <br> </div> <div class="clear"></div> <div id="footer"> <table width="100%" > <tr> <td width="46%" class="F_menu"><a href="http://airccse.org/subscription.html">Subscription</a> <a href="http://airccse.org/membership.html">Membership</a> <a href="http://airccse.org/cscp.html">AIRCC CSCP</a> <a href="http://airccse.org/acontact.html">Contact Us</a> </td> <td width="54%" align="right"><a href="http://airccse.org/index.php"><img src="/csit/abstract/img/logo.gif" alt="" width="21" height="24" /></a><a href="http://www.facebook.com/AIRCCSE"><img src="/csit/abstract/img/facebook.jpeg" alt="" width="21" height="24" /></a><a href="https://twitter.com/AIRCCFP"><img src="/csit/abstract/img/twitter.jpeg" alt="" width="21" height="24" /></a><a href="http://cfptech.wordpress.com/"><img src="/csit/abstract/img/index1.jpeg" alt="" width="21" height="24" /></a></td> </tr> <tr><td height="25" colspan="2"> <p align="center">All Rights Reserved &reg; AIRCC</p> </td></tr> </table> </div> </div> </div> </div> </div> </div> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10