SlideShare a Scribd company logo
1 of 3
Download to read offline
Security has been the number 1 issue for any IT industry and organizations have to adopt to the
new security technology catering to their needs from time to time. Though the DBMS itself has
security features, however multiple features like SQL injection protection,vulnerability
assessments,user control activity etc features are still left unattended.Let us now see what are the
emerging security technologies in the protection of databases.
Protecting sensitive and confidential data of the organization is getting more and more difficult
as new threats are discovered. Database is a ever growing thing and their is a chance for the
presence of loopholes.The main problem when it comes to databases is the DBA should have the
view of all the data as a central controller and he should scour the database for any
vulnerabilities.VMT ( vulnerability management technology) is very useful to view the entire
database landscape and help the DBA to ensure his data of any exploitations.
Once the landscape is clearly scene a series of scans can be administered to see where the
sensitive or high protection needed data is present and using DAM technology (Database
monitoring technology) it is easy to protect the sensitive data effectively and add patches
wherever required. The technology also generates warnings and alerts on violations as it
monitors the database in real time. Most useful feature of using DAM is to collect information
about the use of DBMS which can help in audit purposes.It also provides database firewalls
which is similar to web application firewalls which can discard malicious activity,filter the
queries and have blacklist and whitelist feature as well.
Yes, software security is what people are after.However hardware security is needed wherever
software security cant protect.Nowadays cloud computing has emerged as the most powerful
technology where every information we have will be stored in remote servers and can be
accessed by us whenever needed. But the question arises about the security of the data. So, one
wonderful solution for this involves a hardware security systems where the dedicated chips are
inserted in the servers which can be overridden by the third parties via malicious attacks.These
chips provide security and security verification and makes the cloud system safe and reliable.
It is an obvious fact that providing hardware security for the device gives more confidence that
having a software security solution which can be accessed remotely and malware can come and
reside anywhere, But in these hardware systems there are only designated tasks and limited space
and malware cant even hide there.
Hardware security chips also manage physical problems.For example if there are fluctuations in
temperature,problems in electrical flow and breach of the casting then these chips can erase the
sensitive data.In this way these chips can protect themselves. There is also a facilty of every chip
having a unique digital signature and the user when he stored his information in the server can
see the details about the presence of chip and he can be assured of the safety. However no system
is impregnable but compared to software technologies hardware technologies are very very
difficulat to break. Chip making company Intel has brought mcafee antivirus company and
focussing on hardware security has been a huge step in hardware security technology.
Solution
Security has been the number 1 issue for any IT industry and organizations have to adopt to the
new security technology catering to their needs from time to time. Though the DBMS itself has
security features, however multiple features like SQL injection protection,vulnerability
assessments,user control activity etc features are still left unattended.Let us now see what are the
emerging security technologies in the protection of databases.
Protecting sensitive and confidential data of the organization is getting more and more difficult
as new threats are discovered. Database is a ever growing thing and their is a chance for the
presence of loopholes.The main problem when it comes to databases is the DBA should have the
view of all the data as a central controller and he should scour the database for any
vulnerabilities.VMT ( vulnerability management technology) is very useful to view the entire
database landscape and help the DBA to ensure his data of any exploitations.
Once the landscape is clearly scene a series of scans can be administered to see where the
sensitive or high protection needed data is present and using DAM technology (Database
monitoring technology) it is easy to protect the sensitive data effectively and add patches
wherever required. The technology also generates warnings and alerts on violations as it
monitors the database in real time. Most useful feature of using DAM is to collect information
about the use of DBMS which can help in audit purposes.It also provides database firewalls
which is similar to web application firewalls which can discard malicious activity,filter the
queries and have blacklist and whitelist feature as well.
Yes, software security is what people are after.However hardware security is needed wherever
software security cant protect.Nowadays cloud computing has emerged as the most powerful
technology where every information we have will be stored in remote servers and can be
accessed by us whenever needed. But the question arises about the security of the data. So, one
wonderful solution for this involves a hardware security systems where the dedicated chips are
inserted in the servers which can be overridden by the third parties via malicious attacks.These
chips provide security and security verification and makes the cloud system safe and reliable.
It is an obvious fact that providing hardware security for the device gives more confidence that
having a software security solution which can be accessed remotely and malware can come and
reside anywhere, But in these hardware systems there are only designated tasks and limited space
and malware cant even hide there.
Hardware security chips also manage physical problems.For example if there are fluctuations in
temperature,problems in electrical flow and breach of the casting then these chips can erase the
sensitive data.In this way these chips can protect themselves. There is also a facilty of every chip
having a unique digital signature and the user when he stored his information in the server can
see the details about the presence of chip and he can be assured of the safety. However no system
is impregnable but compared to software technologies hardware technologies are very very
difficulat to break. Chip making company Intel has brought mcafee antivirus company and
focussing on hardware security has been a huge step in hardware security technology.

More Related Content

Similar to Security has been the number 1 issue for any IT industry and organiz.pdf

Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
Octogence
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
Angie Lee
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
Divyank Jindal
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
aquazac
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
Amber Wheeler
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
cuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
salmonpybus
 

Similar to Security has been the number 1 issue for any IT industry and organiz.pdf (20)

R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computing
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud security
Cloud securityCloud security
Cloud security
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network_Security1.pdf.pdf
Network_Security1.pdf.pdfNetwork_Security1.pdf.pdf
Network_Security1.pdf.pdf
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Presentation1
Presentation1Presentation1
Presentation1
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
 
CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assign
 
Security technology
Security technologySecurity technology
Security technology
 
Strategies for Data Leakage Prevention
Strategies for Data Leakage PreventionStrategies for Data Leakage Prevention
Strategies for Data Leakage Prevention
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 

More from anupambedcovers

1). The inheritance of recessive genes (disease causing) can remain .pdf
1). The inheritance of recessive genes (disease causing) can remain .pdf1). The inheritance of recessive genes (disease causing) can remain .pdf
1). The inheritance of recessive genes (disease causing) can remain .pdf
anupambedcovers
 
#ifndef COURSES_H #define COURSES_H class Courses { privat.pdf
#ifndef COURSES_H #define COURSES_H class Courses { privat.pdf#ifndef COURSES_H #define COURSES_H class Courses { privat.pdf
#ifndef COURSES_H #define COURSES_H class Courses { privat.pdf
anupambedcovers
 
C++ Program to Implement Singly Linked List #includei.pdf
  C++ Program to Implement Singly Linked List  #includei.pdf  C++ Program to Implement Singly Linked List  #includei.pdf
C++ Program to Implement Singly Linked List #includei.pdf
anupambedcovers
 
It depends on how many unique protons are adjacen.pdf
                     It depends on how many unique protons are adjacen.pdf                     It depends on how many unique protons are adjacen.pdf
It depends on how many unique protons are adjacen.pdf
anupambedcovers
 
We have layered model used in network design since these layers grou.pdf
We have layered model used in network design since these layers grou.pdfWe have layered model used in network design since these layers grou.pdf
We have layered model used in network design since these layers grou.pdf
anupambedcovers
 

More from anupambedcovers (20)

1). The inheritance of recessive genes (disease causing) can remain .pdf
1). The inheritance of recessive genes (disease causing) can remain .pdf1). The inheritance of recessive genes (disease causing) can remain .pdf
1). The inheritance of recessive genes (disease causing) can remain .pdf
 
$ 90.08WorkingStep-1Monthly Payment CalculationMonhly Payment=L.pdf
$ 90.08WorkingStep-1Monthly Payment  CalculationMonhly Payment=L.pdf$ 90.08WorkingStep-1Monthly Payment  CalculationMonhly Payment=L.pdf
$ 90.08WorkingStep-1Monthly Payment CalculationMonhly Payment=L.pdf
 
#ifndef COURSES_H #define COURSES_H class Courses { privat.pdf
#ifndef COURSES_H #define COURSES_H class Courses { privat.pdf#ifndef COURSES_H #define COURSES_H class Courses { privat.pdf
#ifndef COURSES_H #define COURSES_H class Courses { privat.pdf
 
C++ Program to Implement Singly Linked List #includei.pdf
  C++ Program to Implement Singly Linked List  #includei.pdf  C++ Program to Implement Singly Linked List  #includei.pdf
C++ Program to Implement Singly Linked List #includei.pdf
 
Long term Expected return of the Stock return ty.pdf
           Long term Expected return of the Stock            return ty.pdf           Long term Expected return of the Stock            return ty.pdf
Long term Expected return of the Stock return ty.pdf
 
The English word chemistry has a few senses .pdf
                     The English word chemistry has a few senses .pdf                     The English word chemistry has a few senses .pdf
The English word chemistry has a few senses .pdf
 
since it is (1)^infinity form ...... we get it b.pdf
                     since it is (1)^infinity form ......  we get it b.pdf                     since it is (1)^infinity form ......  we get it b.pdf
since it is (1)^infinity form ...... we get it b.pdf
 
yes as NAI is ionic in nature water disolves ion.pdf
                     yes  as NAI is ionic in nature water disolves ion.pdf                     yes  as NAI is ionic in nature water disolves ion.pdf
yes as NAI is ionic in nature water disolves ion.pdf
 
Mg(0H)2 as there is ionic between Mg & OH and co.pdf
                     Mg(0H)2 as there is ionic between Mg & OH  and co.pdf                     Mg(0H)2 as there is ionic between Mg & OH  and co.pdf
Mg(0H)2 as there is ionic between Mg & OH and co.pdf
 
It depends on how many unique protons are adjacen.pdf
                     It depends on how many unique protons are adjacen.pdf                     It depends on how many unique protons are adjacen.pdf
It depends on how many unique protons are adjacen.pdf
 
x = 1087n = 1430p =xn = 0.76standard error, SE = sqrt(p(1.pdf
x = 1087n = 1430p =xn = 0.76standard error, SE = sqrt(p(1.pdfx = 1087n = 1430p =xn = 0.76standard error, SE = sqrt(p(1.pdf
x = 1087n = 1430p =xn = 0.76standard error, SE = sqrt(p(1.pdf
 
Option B. ie More than one theseSolutionOption B. ie More than.pdf
Option B. ie More than one theseSolutionOption B. ie More than.pdfOption B. ie More than one theseSolutionOption B. ie More than.pdf
Option B. ie More than one theseSolutionOption B. ie More than.pdf
 
When two genes are located on the same chromosome they are called as.pdf
When two genes are located on the same chromosome they are called as.pdfWhen two genes are located on the same chromosome they are called as.pdf
When two genes are located on the same chromosome they are called as.pdf
 
We have layered model used in network design since these layers grou.pdf
We have layered model used in network design since these layers grou.pdfWe have layered model used in network design since these layers grou.pdf
We have layered model used in network design since these layers grou.pdf
 
The half-reactions areAnode Fe = [Fe]2+ + 2 e-Fe(s) release.pdf
The half-reactions areAnode Fe = [Fe]2+ + 2 e-Fe(s) release.pdfThe half-reactions areAnode Fe = [Fe]2+ + 2 e-Fe(s) release.pdf
The half-reactions areAnode Fe = [Fe]2+ + 2 e-Fe(s) release.pdf
 
The answer is CH2Since moles = massmolar massMoles of C H = .pdf
The answer is CH2Since moles = massmolar massMoles of C  H = .pdfThe answer is CH2Since moles = massmolar massMoles of C  H = .pdf
The answer is CH2Since moles = massmolar massMoles of C H = .pdf
 
SolutionFICASocial Security withheld taxMedicre tax withheldRates.pdf
SolutionFICASocial  Security withheld taxMedicre tax  withheldRates.pdfSolutionFICASocial  Security withheld taxMedicre tax  withheldRates.pdf
SolutionFICASocial Security withheld taxMedicre tax withheldRates.pdf
 
Since HCL is a strong acid we can assume that it will fulyy ionise.pdf
Since HCL is a strong acid we can assume that it will fulyy ionise.pdfSince HCL is a strong acid we can assume that it will fulyy ionise.pdf
Since HCL is a strong acid we can assume that it will fulyy ionise.pdf
 
d) Peptide Note that forming a peptide bond resu.pdf
                     d) Peptide  Note that forming a peptide bond resu.pdf                     d) Peptide  Note that forming a peptide bond resu.pdf
d) Peptide Note that forming a peptide bond resu.pdf
 
P.E = - k e2 rnP.E in nth orbit is UnP.E is inversely propotio.pdf
P.E = - k e2  rnP.E in nth orbit is UnP.E is inversely propotio.pdfP.E = - k e2  rnP.E in nth orbit is UnP.E is inversely propotio.pdf
P.E = - k e2 rnP.E in nth orbit is UnP.E is inversely propotio.pdf
 

Recently uploaded

Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 

Security has been the number 1 issue for any IT industry and organiz.pdf

  • 1. Security has been the number 1 issue for any IT industry and organizations have to adopt to the new security technology catering to their needs from time to time. Though the DBMS itself has security features, however multiple features like SQL injection protection,vulnerability assessments,user control activity etc features are still left unattended.Let us now see what are the emerging security technologies in the protection of databases. Protecting sensitive and confidential data of the organization is getting more and more difficult as new threats are discovered. Database is a ever growing thing and their is a chance for the presence of loopholes.The main problem when it comes to databases is the DBA should have the view of all the data as a central controller and he should scour the database for any vulnerabilities.VMT ( vulnerability management technology) is very useful to view the entire database landscape and help the DBA to ensure his data of any exploitations. Once the landscape is clearly scene a series of scans can be administered to see where the sensitive or high protection needed data is present and using DAM technology (Database monitoring technology) it is easy to protect the sensitive data effectively and add patches wherever required. The technology also generates warnings and alerts on violations as it monitors the database in real time. Most useful feature of using DAM is to collect information about the use of DBMS which can help in audit purposes.It also provides database firewalls which is similar to web application firewalls which can discard malicious activity,filter the queries and have blacklist and whitelist feature as well. Yes, software security is what people are after.However hardware security is needed wherever software security cant protect.Nowadays cloud computing has emerged as the most powerful technology where every information we have will be stored in remote servers and can be accessed by us whenever needed. But the question arises about the security of the data. So, one wonderful solution for this involves a hardware security systems where the dedicated chips are inserted in the servers which can be overridden by the third parties via malicious attacks.These chips provide security and security verification and makes the cloud system safe and reliable. It is an obvious fact that providing hardware security for the device gives more confidence that having a software security solution which can be accessed remotely and malware can come and reside anywhere, But in these hardware systems there are only designated tasks and limited space and malware cant even hide there. Hardware security chips also manage physical problems.For example if there are fluctuations in temperature,problems in electrical flow and breach of the casting then these chips can erase the sensitive data.In this way these chips can protect themselves. There is also a facilty of every chip having a unique digital signature and the user when he stored his information in the server can see the details about the presence of chip and he can be assured of the safety. However no system
  • 2. is impregnable but compared to software technologies hardware technologies are very very difficulat to break. Chip making company Intel has brought mcafee antivirus company and focussing on hardware security has been a huge step in hardware security technology. Solution Security has been the number 1 issue for any IT industry and organizations have to adopt to the new security technology catering to their needs from time to time. Though the DBMS itself has security features, however multiple features like SQL injection protection,vulnerability assessments,user control activity etc features are still left unattended.Let us now see what are the emerging security technologies in the protection of databases. Protecting sensitive and confidential data of the organization is getting more and more difficult as new threats are discovered. Database is a ever growing thing and their is a chance for the presence of loopholes.The main problem when it comes to databases is the DBA should have the view of all the data as a central controller and he should scour the database for any vulnerabilities.VMT ( vulnerability management technology) is very useful to view the entire database landscape and help the DBA to ensure his data of any exploitations. Once the landscape is clearly scene a series of scans can be administered to see where the sensitive or high protection needed data is present and using DAM technology (Database monitoring technology) it is easy to protect the sensitive data effectively and add patches wherever required. The technology also generates warnings and alerts on violations as it monitors the database in real time. Most useful feature of using DAM is to collect information about the use of DBMS which can help in audit purposes.It also provides database firewalls which is similar to web application firewalls which can discard malicious activity,filter the queries and have blacklist and whitelist feature as well. Yes, software security is what people are after.However hardware security is needed wherever software security cant protect.Nowadays cloud computing has emerged as the most powerful technology where every information we have will be stored in remote servers and can be accessed by us whenever needed. But the question arises about the security of the data. So, one wonderful solution for this involves a hardware security systems where the dedicated chips are inserted in the servers which can be overridden by the third parties via malicious attacks.These chips provide security and security verification and makes the cloud system safe and reliable. It is an obvious fact that providing hardware security for the device gives more confidence that having a software security solution which can be accessed remotely and malware can come and reside anywhere, But in these hardware systems there are only designated tasks and limited space and malware cant even hide there.
  • 3. Hardware security chips also manage physical problems.For example if there are fluctuations in temperature,problems in electrical flow and breach of the casting then these chips can erase the sensitive data.In this way these chips can protect themselves. There is also a facilty of every chip having a unique digital signature and the user when he stored his information in the server can see the details about the presence of chip and he can be assured of the safety. However no system is impregnable but compared to software technologies hardware technologies are very very difficulat to break. Chip making company Intel has brought mcafee antivirus company and focussing on hardware security has been a huge step in hardware security technology.