A Study on Database Vulnerable Object Analysis and Control Technology

Download Now
Provided by: AICIT
Topic: Big Data
Format: PDF
The vulnerability exists in the database which stores important information, the incident that caused by vulnerability attacking appears as the loss or damage about important asset. In addition, preparation for personal information protection act which passed at national assembly, database vulnerability analysis and research is needed for strengthening security. In this paper, the information in the database, weak data defined as role base, vulnerability analysis the database by role. For managing scattered vulnerable information and important information, analysis vulnerable objects and performs extraction and control.
Download Now

Find By Topic