Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Database Security through Risk Assessment

Print
PDF
IJCA Proceedings on National Conference on Recent Trends in Information Security
© 2015 by IJCA Journal
NCRTIS 2015 - Number 1
Year of Publication: 2015
Authors:
Rajani D. Singh
S. B. Kishor

Rajani D Singh and S b Kishor. Article: Database Security through Risk Assessment. IJCA Proceedings on National Conference on Recent Trends in Information Security NCRTIS 2015(1):11-13, April 2015. Full text available. BibTeX

@article{key:article,
	author = {Rajani D. Singh and S.b. Kishor},
	title = {Article: Database Security through Risk Assessment},
	journal = {IJCA Proceedings on National Conference on Recent Trends in Information Security},
	year = {2015},
	volume = {NCRTIS 2015},
	number = {1},
	pages = {11-13},
	month = {April},
	note = {Full text available}
}

Abstract

Database Security is the foundation of the new Electronic Business, E-Commerce and other Business System including Intranet and Extranet Users. The Internet and E-Commerce uses have ballooned and India has become an emerging power in the IT Enabled Services field. As Internet accessing costs are falling user's increases and India ranking in terms of Internet users is raising fast. Vulnerability hunts for the weakness in Database and generally concentrates on the database security problems which mainly arise due to the increasing number of users having various levels of access to the central as well as distributed databases. Database security requirements are dynamic in nature. Now a day, hackers beat network security by masking themselves as legitimate users. The intruders can penetrate systems with one of the legitimate access account. Generally they are not going to breaking down gates, but they can access each system with legitimate certificate. Hackers steal user's information from a home user's computer, tricking employees into breaking passwords or user names, or sniffing an ISP. Some Techniques like Buffer Overflow, SQL Injection, Pharming, Bots and Trojan Horses are the terms who inject the problems in Database. Semantic Encoding, Vulnerability Assessment Scanner, Bound Checking and Intrusion Prevention are some techniques to solve the security related Problems of database distributed over the Internet.

References

  • Ali Amer Alwan, Hamidah Ibrahim and Nur Izura Udzir, "A model for ranking and selecting integrity tests in a distributed database", international journal of information technology and web engineering, volume 5, issue 3. 1554-1045, pages 65-84
  • E. Eugene Schultz, "Computer forensics challenges in responding to incidents in real-life settings, computer fraud & security", volume 2007, issue 12, 1361-3723, December 2007, pages 12–16
  • Kevin Hamlen, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham, "Security issues for cloud computing", international journal of information security and privacy, volume 4, issue 2, 1930-1650, pages 39-51.
  • Nigel Hawthorn, "Finding security in the cloud, computer fraud & security", volume 2009, issue 10, 13613723, October 2009, pages 19-20
  • Robert L. Totterdale, Robert Morris University, USA, "Globalization and data privacy: an exploratory study", international journal of information security and privacy", volume 4, issue 2, 1744-1765. mohd alwi, najwa hayaati; fan, ip-shing, "information security threats analysis for e-learning", volume 73, 2010, springer-verlag berlin heidelberg, isbn 978-3-642-13165-3
  • M. Tamer Ozsu, "Distributed Database System", pearson edu. , fourth edition, 2004,81-7758-177-5, Delhi
  • R. Paneerselvam, "Database Management System", Prentic hall in india, eighth edition, 2007, 978-81-203-2028-4, New Delhi
  • R. Buyya, J. Broberg, "Cloud Computing Principals and Paradigms", wiley press, first edition, 2011, 978-0470887998, New York, USA
  • Silberschstz, "Database System Concepts", Tata Mcgrawhill, fourth edition, 0-07-228363-7, New Delhi
  • Silberschstz, "Database System Concepts", Tata Mcgrawhill, fifth edition, 2006, 0. 07-124476-x, New Delhi
  • Diane Barrett, Greg Kipper, "Virtualization and Forensics", Syngress, 2010, 978-1-59749-557-8,
  • Whitehorn, "Insite Relational Database", Springer International Edition, second edition, 2003, 81-8128-052-0, New Delhi
  • Wilbur Cross, "Investor Alert! How to protect your money from schemes, scams, and frauds", Andrews and Mcmeel, 1988, 9780875022307