CFP last date
20 May 2024
Reseach Article

Database Security through Risk Assessment

Published on April 2015 by Rajani D. Singh, S.b. Kishor
National Conference on Recent Trends in Information Security
Foundation of Computer Science USA
NCRTIS2015 - Number 1
April 2015
Authors: Rajani D. Singh, S.b. Kishor
f84b2add-dd84-4e10-b7c8-f9a04c7554ce

Rajani D. Singh, S.b. Kishor . Database Security through Risk Assessment. National Conference on Recent Trends in Information Security. NCRTIS2015, 1 (April 2015), 11-13.

@article{
author = { Rajani D. Singh, S.b. Kishor },
title = { Database Security through Risk Assessment },
journal = { National Conference on Recent Trends in Information Security },
issue_date = { April 2015 },
volume = { NCRTIS2015 },
number = { 1 },
month = { April },
year = { 2015 },
issn = 0975-8887,
pages = { 11-13 },
numpages = 3,
url = { /proceedings/ncrtis2015/number1/20109-4003/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Information Security
%A Rajani D. Singh
%A S.b. Kishor
%T Database Security through Risk Assessment
%J National Conference on Recent Trends in Information Security
%@ 0975-8887
%V NCRTIS2015
%N 1
%P 11-13
%D 2015
%I International Journal of Computer Applications
Abstract

Database Security is the foundation of the new Electronic Business, E-Commerce and other Business System including Intranet and Extranet Users. The Internet and E-Commerce uses have ballooned and India has become an emerging power in the IT Enabled Services field. As Internet accessing costs are falling user's increases and India ranking in terms of Internet users is raising fast. Vulnerability hunts for the weakness in Database and generally concentrates on the database security problems which mainly arise due to the increasing number of users having various levels of access to the central as well as distributed databases. Database security requirements are dynamic in nature. Now a day, hackers beat network security by masking themselves as legitimate users. The intruders can penetrate systems with one of the legitimate access account. Generally they are not going to breaking down gates, but they can access each system with legitimate certificate. Hackers steal user's information from a home user's computer, tricking employees into breaking passwords or user names, or sniffing an ISP. Some Techniques like Buffer Overflow, SQL Injection, Pharming, Bots and Trojan Horses are the terms who inject the problems in Database. Semantic Encoding, Vulnerability Assessment Scanner, Bound Checking and Intrusion Prevention are some techniques to solve the security related Problems of database distributed over the Internet.

References
  1. Ali Amer Alwan, Hamidah Ibrahim and Nur Izura Udzir, "A model for ranking and selecting integrity tests in a distributed database", international journal of information technology and web engineering, volume 5, issue 3. 1554-1045, pages 65-84
  2. E. Eugene Schultz, "Computer forensics challenges in responding to incidents in real-life settings, computer fraud & security", volume 2007, issue 12, 1361-3723, December 2007, pages 12–16
  3. Kevin Hamlen, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham, "Security issues for cloud computing", international journal of information security and privacy, volume 4, issue 2, 1930-1650, pages 39-51.
  4. Nigel Hawthorn, "Finding security in the cloud, computer fraud & security", volume 2009, issue 10, 13613723, October 2009, pages 19-20
  5. Robert L. Totterdale, Robert Morris University, USA, "Globalization and data privacy: an exploratory study", international journal of information security and privacy", volume 4, issue 2, 1744-1765. mohd alwi, najwa hayaati; fan, ip-shing, "information security threats analysis for e-learning", volume 73, 2010, springer-verlag berlin heidelberg, isbn 978-3-642-13165-3
  6. M. Tamer Ozsu, "Distributed Database System", pearson edu. , fourth edition, 2004,81-7758-177-5, Delhi
  7. R. Paneerselvam, "Database Management System", Prentic hall in india, eighth edition, 2007, 978-81-203-2028-4, New Delhi
  8. R. Buyya, J. Broberg, "Cloud Computing Principals and Paradigms", wiley press, first edition, 2011, 978-0470887998, New York, USA
  9. Silberschstz, "Database System Concepts", Tata Mcgrawhill, fourth edition, 0-07-228363-7, New Delhi
  10. Silberschstz, "Database System Concepts", Tata Mcgrawhill, fifth edition, 2006, 0. 07-124476-x, New Delhi
  11. Diane Barrett, Greg Kipper, "Virtualization and Forensics", Syngress, 2010, 978-1-59749-557-8,
  12. Whitehorn, "Insite Relational Database", Springer International Edition, second edition, 2003, 81-8128-052-0, New Delhi
  13. Wilbur Cross, "Investor Alert! How to protect your money from schemes, scams, and frauds", Andrews and Mcmeel, 1988, 9780875022307
Index Terms

Computer Science
Information Sciences

Keywords

Distributed Servers Virtualization Risk Assessment Vulnerability Assessment.