Reducing Database Security Implementation Gaps
نویسندگان
چکیده
The proposed strategy borrows from risk analysis methods and consists of nine elements. The first step is system characterization. This should be followed by identification of threats, gap identification, control analysis, determination of the likelihood of occurrence, an impact analysis, risk determination, recommendations for control and finally documentation of results. System characterization involves determining the level of risk in each aspect of the system. After characterizing, the organization needs to identify threats. Gap identification is done by detecting whether a control exists in the system. A control analysis involves the examination of the controls put in place to guard against threats. Thereafter, the organization ought to determine the likelihood of occurrence of a threat. Impact analysis involves examining the effects of the threat once gaps are exploited. Risk determination is a ranking process that will affect resource allocation in the organization based on the threats with the highest chance of occurrence. Recommendations and documentation are the last phase.
منابع مشابه
A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing
Correctness verification of query results is a significant challenge in database outsourcing. Most of the proposed approaches impose high overhead, which makes them impractical in real scenarios. Probabilistic approaches are proposed in order to reduce the computation overhead pertaining to the verification process. In this paper, we use the notion of trust as the basis of our probabilistic app...
متن کاملSecurity Gaps in Databases: A Comparison of Alternative Software Products for Web Applications Support
When deploying database-centric web applications, administrators should pay special attention to database security requirements. Acknowledging this, Database Management Systems (DBMS) implement several security mechanisms that help Database Administrators (DBAs) making their installations secure. However, different software products offer different sets of mechanisms, making the task of selecti...
متن کاملA Formal Implementation of Database Security
This paper is to investigate the impplementation of security mechanism in object oriented database system. Formal methods plays an essential role in computer security due to its powerful expressiveness and concise syntax and semantics. In this paper, both issues of specification and implementation in database security environment will be considered; and the database security is achieved through...
متن کاملMillets for Food and Nutrition Security in India: Determinants and Policy Implications
Background: Food security has been a target in India since its independence; the primary aim of food security is to ensure enough staple food for the entire population. Although substantial progress was made through the adoption of green revolution (GR) technologies and implementation of the food public distribution system (PDS), desirable food and nutrition security, as defined by the food and...
متن کاملThe need for improved alignment between actability, strategic planning of IS and information security
The purpose of this paper is to high-light problems regarding user actability and security implementations – what are the important mechanisms that affect actability in usage situations? Alignment between actability and strategic IS-planning and security issues is of the essence. However, serious gaps in alignment have been identified concerning strategic IS-planning as well as in development o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014