SlideShare a Scribd company logo
1 of 1
Download to read offline
Securing the data in a database is typically as important a concern as is its design. Research
database security on the web, and then respond to the following:
Describe a few security risks that databases must be protected against.
Describe some steps that can be taken to ensure that a database is secured.
Solution
Risks :
1) excess privileges : many users are provided with default priveleges out of which some are not
necessary for them and may be misused.
2) database injection attacks like SQL and No-SQL attacks are used to fetch confidential data
and manipulate it
3)malware - application that capture private data
4) Unprotected storage media like backup disks and tapes.
5) lack of professional to handle security mechanisms.
Mitigation steps :
1)monitoring DB access activity with user identification
2) remove excess rights
3) train more number of secirity professionals
4) block malicious requests to data

More Related Content

Similar to Securing the data in a database is typically as important a concern .pdf

MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptx
missionsk81
 
Database Security – Issues and Best PracticesOutline
Database Security – Issues and Best PracticesOutlineDatabase Security – Issues and Best PracticesOutline
Database Security – Issues and Best PracticesOutline
OllieShoresna
 
Database Security Management
Database Security Management Database Security Management
Database Security Management
Ahsin Yousaf
 
Oracle database 12c security and compliance
Oracle database 12c security and complianceOracle database 12c security and compliance
Oracle database 12c security and compliance
FITSFSd
 

Similar to Securing the data in a database is typically as important a concern .pdf (20)

Database security in database management.pptx
Database security in database management.pptxDatabase security in database management.pptx
Database security in database management.pptx
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
 
Database security
Database securityDatabase security
Database security
 
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptx
 
System security
System securitySystem security
System security
 
Database Security – Issues and Best PracticesOutline
Database Security – Issues and Best PracticesOutlineDatabase Security – Issues and Best PracticesOutline
Database Security – Issues and Best PracticesOutline
 
DBMS Vulnerabilities And Threats.pptx
DBMS Vulnerabilities And Threats.pptxDBMS Vulnerabilities And Threats.pptx
DBMS Vulnerabilities And Threats.pptx
 
Database security
Database securityDatabase security
Database security
 
Cloud computing final show
Cloud computing final   showCloud computing final   show
Cloud computing final show
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
 
Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013
 
Database Security Management
Database Security Management Database Security Management
Database Security Management
 
Oracle database 12c security and compliance
Oracle database 12c security and complianceOracle database 12c security and compliance
Oracle database 12c security and compliance
 
هک پایگاه داده و راهکارهای مقابلهDatabases hacking, safeguards and counterme...
 هک پایگاه داده و راهکارهای مقابلهDatabases hacking, safeguards and counterme... هک پایگاه داده و راهکارهای مقابلهDatabases hacking, safeguards and counterme...
هک پایگاه داده و راهکارهای مقابلهDatabases hacking, safeguards and counterme...
 
Database security
Database securityDatabase security
Database security
 
A DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKA DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORK
 
A Database System Security Framework
A Database System Security FrameworkA Database System Security Framework
A Database System Security Framework
 
Data base security & integrity
Data base security &  integrityData base security &  integrity
Data base security & integrity
 

More from arishaenterprises12

In biology, the roles of transition metal ions can be broadly groupe.pdf
In biology, the roles of transition metal ions can be broadly groupe.pdfIn biology, the roles of transition metal ions can be broadly groupe.pdf
In biology, the roles of transition metal ions can be broadly groupe.pdf
arishaenterprises12
 
I need help with this one Question 18 of 18 Sapling Learning macmill.pdf
I need help with this one Question 18 of 18 Sapling Learning macmill.pdfI need help with this one Question 18 of 18 Sapling Learning macmill.pdf
I need help with this one Question 18 of 18 Sapling Learning macmill.pdf
arishaenterprises12
 
Explain how recombination increases the amount of genetic variation i.pdf
Explain how recombination increases the amount of genetic variation i.pdfExplain how recombination increases the amount of genetic variation i.pdf
Explain how recombination increases the amount of genetic variation i.pdf
arishaenterprises12
 
Chapter 7 , book Health in the Later Years, 5th EditionGive a his.pdf
Chapter 7 , book Health in the Later Years, 5th EditionGive a his.pdfChapter 7 , book Health in the Later Years, 5th EditionGive a his.pdf
Chapter 7 , book Health in the Later Years, 5th EditionGive a his.pdf
arishaenterprises12
 
Discuss the benefits of event-driven programming.Contrast event-dr.pdf
Discuss the benefits of event-driven programming.Contrast event-dr.pdfDiscuss the benefits of event-driven programming.Contrast event-dr.pdf
Discuss the benefits of event-driven programming.Contrast event-dr.pdf
arishaenterprises12
 
Before 1900, despite its weaknesses in effective management of worke.pdf
Before 1900, despite its weaknesses in effective management of worke.pdfBefore 1900, despite its weaknesses in effective management of worke.pdf
Before 1900, despite its weaknesses in effective management of worke.pdf
arishaenterprises12
 
Alpha particle radiation sensor. A silicon diode radiation sensor is .pdf
Alpha particle radiation sensor. A silicon diode radiation sensor is .pdfAlpha particle radiation sensor. A silicon diode radiation sensor is .pdf
Alpha particle radiation sensor. A silicon diode radiation sensor is .pdf
arishaenterprises12
 
A ship was caught in a storm and driven to a small island in the mid.pdf
A ship was caught in a storm and driven to a small island in the mid.pdfA ship was caught in a storm and driven to a small island in the mid.pdf
A ship was caught in a storm and driven to a small island in the mid.pdf
arishaenterprises12
 
Among 10 people traveling in a group, 2 have outdated passports. It .pdf
Among 10 people traveling in a group, 2 have outdated passports. It .pdfAmong 10 people traveling in a group, 2 have outdated passports. It .pdf
Among 10 people traveling in a group, 2 have outdated passports. It .pdf
arishaenterprises12
 
1.) The normal eye color of Drosophila is red, but strains in which .pdf
1.) The normal eye color of Drosophila is red, but strains in which .pdf1.) The normal eye color of Drosophila is red, but strains in which .pdf
1.) The normal eye color of Drosophila is red, but strains in which .pdf
arishaenterprises12
 
29. Code an application program that keeps track of student informat.pdf
29. Code an application program that keeps track of student informat.pdf29. Code an application program that keeps track of student informat.pdf
29. Code an application program that keeps track of student informat.pdf
arishaenterprises12
 

More from arishaenterprises12 (20)

It was noted that excess water can kill plants. If water is not toxi.pdf
It was noted that excess water can kill plants. If water is not toxi.pdfIt was noted that excess water can kill plants. If water is not toxi.pdf
It was noted that excess water can kill plants. If water is not toxi.pdf
 
In biology, the roles of transition metal ions can be broadly groupe.pdf
In biology, the roles of transition metal ions can be broadly groupe.pdfIn biology, the roles of transition metal ions can be broadly groupe.pdf
In biology, the roles of transition metal ions can be broadly groupe.pdf
 
Image that a researcher examined how the people’s heights are associ.pdf
Image that a researcher examined how the people’s heights are associ.pdfImage that a researcher examined how the people’s heights are associ.pdf
Image that a researcher examined how the people’s heights are associ.pdf
 
I need help with this one Question 18 of 18 Sapling Learning macmill.pdf
I need help with this one Question 18 of 18 Sapling Learning macmill.pdfI need help with this one Question 18 of 18 Sapling Learning macmill.pdf
I need help with this one Question 18 of 18 Sapling Learning macmill.pdf
 
Explain how recombination increases the amount of genetic variation i.pdf
Explain how recombination increases the amount of genetic variation i.pdfExplain how recombination increases the amount of genetic variation i.pdf
Explain how recombination increases the amount of genetic variation i.pdf
 
exclange I ren peretr) ol and eleaced by the maxtit wadr Ho t Col pox.pdf
exclange I ren peretr) ol and eleaced by the maxtit wadr Ho t Col pox.pdfexclange I ren peretr) ol and eleaced by the maxtit wadr Ho t Col pox.pdf
exclange I ren peretr) ol and eleaced by the maxtit wadr Ho t Col pox.pdf
 
DNA is a macromolecule that is critical for life. Much of the functi.pdf
DNA is a macromolecule that is critical for life. Much of the functi.pdfDNA is a macromolecule that is critical for life. Much of the functi.pdf
DNA is a macromolecule that is critical for life. Much of the functi.pdf
 
Chapter 7 , book Health in the Later Years, 5th EditionGive a his.pdf
Chapter 7 , book Health in the Later Years, 5th EditionGive a his.pdfChapter 7 , book Health in the Later Years, 5th EditionGive a his.pdf
Chapter 7 , book Health in the Later Years, 5th EditionGive a his.pdf
 
Discuss the benefits of event-driven programming.Contrast event-dr.pdf
Discuss the benefits of event-driven programming.Contrast event-dr.pdfDiscuss the benefits of event-driven programming.Contrast event-dr.pdf
Discuss the benefits of event-driven programming.Contrast event-dr.pdf
 
Before 1900, despite its weaknesses in effective management of worke.pdf
Before 1900, despite its weaknesses in effective management of worke.pdfBefore 1900, despite its weaknesses in effective management of worke.pdf
Before 1900, despite its weaknesses in effective management of worke.pdf
 
Alpha particle radiation sensor. A silicon diode radiation sensor is .pdf
Alpha particle radiation sensor. A silicon diode radiation sensor is .pdfAlpha particle radiation sensor. A silicon diode radiation sensor is .pdf
Alpha particle radiation sensor. A silicon diode radiation sensor is .pdf
 
A ship was caught in a storm and driven to a small island in the mid.pdf
A ship was caught in a storm and driven to a small island in the mid.pdfA ship was caught in a storm and driven to a small island in the mid.pdf
A ship was caught in a storm and driven to a small island in the mid.pdf
 
8. List 4 GENERAL ways that a CELL, can DECREASE the rate of its rea.pdf
8. List 4 GENERAL ways that a CELL, can DECREASE the rate of its rea.pdf8. List 4 GENERAL ways that a CELL, can DECREASE the rate of its rea.pdf
8. List 4 GENERAL ways that a CELL, can DECREASE the rate of its rea.pdf
 
As leaf temperature increases from 20°C to 35°C, the quantum yield o.pdf
As leaf temperature increases from 20°C to 35°C, the quantum yield o.pdfAs leaf temperature increases from 20°C to 35°C, the quantum yield o.pdf
As leaf temperature increases from 20°C to 35°C, the quantum yield o.pdf
 
Among 10 people traveling in a group, 2 have outdated passports. It .pdf
Among 10 people traveling in a group, 2 have outdated passports. It .pdfAmong 10 people traveling in a group, 2 have outdated passports. It .pdf
Among 10 people traveling in a group, 2 have outdated passports. It .pdf
 
1.) The normal eye color of Drosophila is red, but strains in which .pdf
1.) The normal eye color of Drosophila is red, but strains in which .pdf1.) The normal eye color of Drosophila is red, but strains in which .pdf
1.) The normal eye color of Drosophila is red, but strains in which .pdf
 
29. Code an application program that keeps track of student informat.pdf
29. Code an application program that keeps track of student informat.pdf29. Code an application program that keeps track of student informat.pdf
29. Code an application program that keeps track of student informat.pdf
 
Write the code for a small function called myStack, which creates a .pdf
Write the code for a small function called myStack, which creates a .pdfWrite the code for a small function called myStack, which creates a .pdf
Write the code for a small function called myStack, which creates a .pdf
 
Why does the neutralization of an acid by a base often produce water.pdf
Why does the neutralization of an acid by a base often produce water.pdfWhy does the neutralization of an acid by a base often produce water.pdf
Why does the neutralization of an acid by a base often produce water.pdf
 
Which statement about phloem transport is falseIt takes place in .pdf
Which statement about phloem transport is falseIt takes place in .pdfWhich statement about phloem transport is falseIt takes place in .pdf
Which statement about phloem transport is falseIt takes place in .pdf
 

Recently uploaded

SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 

Recently uploaded (20)

PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 

Securing the data in a database is typically as important a concern .pdf

  • 1. Securing the data in a database is typically as important a concern as is its design. Research database security on the web, and then respond to the following: Describe a few security risks that databases must be protected against. Describe some steps that can be taken to ensure that a database is secured. Solution Risks : 1) excess privileges : many users are provided with default priveleges out of which some are not necessary for them and may be misused. 2) database injection attacks like SQL and No-SQL attacks are used to fetch confidential data and manipulate it 3)malware - application that capture private data 4) Unprotected storage media like backup disks and tapes. 5) lack of professional to handle security mechanisms. Mitigation steps : 1)monitoring DB access activity with user identification 2) remove excess rights 3) train more number of secirity professionals 4) block malicious requests to data