Databases are designed to promote open and flexible access to data but at the same time it is this same open access that makes databases vulnerable to various kinds of malicious activities. KEYWORDS: Database security, Attack, Vulnerability,ĭatabases introduce a number of unique security requirements for their users and administrators.
Within that context, database security encompasses three constructs: confidentiality or protection of data from unauthorized disclosure, integrity or prevention from unauthorized data access, and availability or the identification of and recovery from hardware and software errors or malicious activity resulting in the denial of data availability. While database security incorporates a wide array of security topics, not withstanding, physical security, network security, encryption and authentication, this paper focuses on the concepts and mechanisms particular to securing data. At its core, database security strives to insure that only authenticated users perform authorized activities at authorized times. The purpose of this paper is to highlight and identify the main methods and facets of attack on a database, as well as ways to deflect attacks, through focusing on the delicate issue of data inference. Also, each and every additional internal user that would be added to user base can create further serious security problems.
Network and Internet connections to databases may complicate things even further. The more complex the databases are, more complex the security measures that are to be applied. Ensuring the security of databases is a complex issue for companies. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. Department of Computer Science and Engineering Department of Computer Science and Engineering JIET, Jodhpur JIET, security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data.