Database Security through Risk Assessment

نویسندگان

  • Rajani D. Singh
  • S. B. Kishor
  • Ali Amer Alwan
  • Hamidah Ibrahim
  • Nur Izura Udzir
  • Kevin Hamlen
  • Murat Kantarcioglu
  • Latifur Khan
  • Bhavani Thuraisingham
  • Robert L. Totterdale
  • Robert Morris
چکیده

Database Security is the foundation of the new Electronic Business, E-Commerce and other Business System including Intranet and Extranet Users. The Internet and E-Commerce uses have ballooned and India has become an emerging power in the IT Enabled Services field. As Internet accessing costs are falling user's increases and India ranking in terms of Internet users is raising fast. Vulnerability hunts for the weakness in Database and generally concentrates on the database security problems which mainly arise due to the increasing number of users having various levels of access to the central as well as distributed databases. Database security requirements are dynamic in nature. Now a day, hackers beat network security by masking themselves as legitimate users. The intruders can penetrate systems with

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Software Selection based on Quantitative Security Risk Assessment

Multiple software products often exist on the same server and therefore vulnerability in one product might compromise the entire system. It is imperative to perform a security risk assessment during the selection of the candidate software products that become part of a larger system. Having a quantitative security risk assessment model provides an objective criterion for such assessment and com...

متن کامل

Analysis and Design on Decision Support System of Security Risk Management in Rural Power Network

The paper, according the investigation and research of the requirement of rural grid security risk management, designs a decision support system to assist decision-making of security risk management. System database and knowledge base were built, progress the model of security risk assessment. The application of methods of statistical analysis and reasoning, avoids, prevents and controls the se...

متن کامل

Contamination and Risk Assessment of Total Aflatoxin in Iranian Rice in Various Food Security Regions

Background and Objectives: Aflatoxin is one of the most important and common toxins in high consumption foods such as rice, which can threaten health of the consumers. In this study, risk of total aflatoxin based on its exposure levels and adverse effects was assessed in Iranian rice.  Materials & Methods: This study was carried out on total aflatoxin in 60 national rice samples collected base...

متن کامل

Development of an E-Healthcare Information Security Risk Assessment Method

This paper developed a method to assess information security risks in e-healthcare. Specifically, it first developed a static E-Healthcare Information Security Risk (EHISR) model to present thirty-three security risk factors by identifying information security threats and their sources in e-healthcare. Second, a dynamic E-Healthcare Information Flow (EHIF) model was developed to logically link ...

متن کامل

A threat risk modeling framework for Geospatial Weather Information System (GWIS) a DREAD based study

Over the years, the focus has been on protecting network, host, database and standard applications from internal and external threats. The Rapid Application Development (RAD) process makes the web application extremely short and makes it difficult to eliminate the vulnerabilities. Here we study web application risk assessment technique called threat risk modeling to improve the security of the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015