Running head: SECURITY RISKS IN DATABASE MIGRATION 1 SECURITY RISKS IN DATABASE MIGRATION 3 Security Risks in Database Migration Name Institutional Affiliation Security Risks in Database Migration As organizations become more reliant on database applications, companies may require to migrate their databases allowing for cheaper running which can then replicated to the consumers with reduced charges. This can be demonstrated with the recent move of Apple Inc.’s iCloud user data to Chinese servers. The move by the company was to reduce the expense of running the severs “inhouse,” however, brought about questions regarding data security for people using smart devices. Nevertheless, data migration can be daunting particularly when the event is unplanned or unwanted (Fisch, White, & Pooh, 2017). When companies migrate, they experience some risks and challenges as servers are moved from one location to another. Among the first issues is the loss of data or information (Fisch, White, & Pooh, 2017). In a recent study, it was estimated that this problem accounts for approximately fifty percent of all problems that occur during this process. The outcomes of this problem are viewed as damaging for both businesses and individuals using the services (Fisch, White, & Pooh, 2017). Though this problem is common during database migration, it is not the only one, another issue is semantics risk (Malik & Patel, 2016). The term semantic risk is given or used in database security when data or information is imprecisely, or improperly stored resulting in misinterpretations that quickly escalate to adverse outcomes due to computation errors. Therefore, even if the data transfer to the new location was completely efficient some errors may occur when recompiling the data. There are possibilities that information can be unintentionally saved in the wrong location or folder. This can be especially harmful to organizations that deal with numbers or currency such as the various stock exchange organizations globally. In other words, sematic risk can be described as when misunderstanding results in misallocation (Malik & Patel, 2016). This can allow hackers to easily access data that should be properly secured by the various protocols in place. The final security issue with data migration is the risk of incompatibility, though compatibility can be tested, not all the data being sent will be compatible in some cases exemplifying them from security measures thus offering a breach or point of attack (Yunis, Yunus, Nawi, & Surin, 2017). Overall, data security is important as demonstrated by the recent attacks and breaches that resulted in data leaks of high-profile companies for example Facebook. When migrating data from one server to another as done by Apple Inc. In the example offered, corporate data has to be accessed and for this reason, security cannot be left to chance as the information is both sensitive and critical (K ...