Security

An Integrated Model for Access Control and Encryption of Data in Database

Download Now Free registration required

Executive Summary

As organization increases their reliance on information systems for daily business increases, they become more vulnerable to security breaches even as they gain productivity and efficiency advantages. Traditionally, database security uses techniques like encryption and securely sharing of the data. They primarily focus on creating user accounts and managing user privileges to database objects but in current scenario, attacks like SQL injection, buffer overflow, etc. are also present which have more penetration to attack. While designing the database its security is also an important issue. To secure the data there are two ways one is the use of access control and the other one is the data encryption but both of them used alone are not very strong today.

  • Format: PDF
  • Size: 116.66 KB