Reducing Database Security Implementation Gaps

نویسندگان

  • Mohammad Iqbal
  • Farid Ahmad
  • Manoj Kumar Singh
چکیده

The proposed strategy borrows from risk analysis methods and consists of nine elements. The first step is system characterization. This should be followed by identification of threats, gap identification, control analysis, determination of the likelihood of occurrence, an impact analysis, risk determination, recommendations for control and finally documentation of results. System characterization involves determining the level of risk in each aspect of the system. After characterizing, the organization needs to identify threats. Gap identification is done by detecting whether a control exists in the system. A control analysis involves the examination of the controls put in place to guard against threats. Thereafter, the organization ought to determine the likelihood of occurrence of a threat. Impact analysis involves examining the effects of the threat once gaps are exploited. Risk determination is a ranking process that will affect resource allocation in the organization based on the threats with the highest chance of occurrence. Recommendations and documentation are the last phase.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing

Correctness verification of query results is a significant challenge in database outsourcing. Most of the proposed approaches impose high overhead, which makes them impractical in real scenarios. Probabilistic approaches are proposed in order to reduce the computation overhead pertaining to the verification process. In this paper, we use the notion of trust as the basis of our probabilistic app...

متن کامل

Security Gaps in Databases: A Comparison of Alternative Software Products for Web Applications Support

When deploying database-centric web applications, administrators should pay special attention to database security requirements. Acknowledging this, Database Management Systems (DBMS) implement several security mechanisms that help Database Administrators (DBAs) making their installations secure. However, different software products offer different sets of mechanisms, making the task of selecti...

متن کامل

A Formal Implementation of Database Security

This paper is to investigate the impplementation of security mechanism in object oriented database system. Formal methods plays an essential role in computer security due to its powerful expressiveness and concise syntax and semantics. In this paper, both issues of specification and implementation in database security environment will be considered; and the database security is achieved through...

متن کامل

Millets for Food and Nutrition Security in India: Determinants and Policy Implications

Background: Food security has been a target in India since its independence; the primary aim of food security is to ensure enough staple food for the entire population. Although substantial progress was made through the adoption of green revolution (GR) technologies and implementation of the food public distribution system (PDS), desirable food and nutrition security, as defined by the food and...

متن کامل

The need for improved alignment between actability, strategic planning of IS and information security

The purpose of this paper is to high-light problems regarding user actability and security implementations – what are the important mechanisms that affect actability in usage situations? Alignment between actability and strategic IS-planning and security issues is of the essence. However, serious gaps in alignment have been identified concerning strategic IS-planning as well as in development o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014