International Journal of Emerging Technology and Advanced Engineering (IJETAE)
The people can distinguish three basic properties of information security, which should be implemented in nearly all IT systems: confidentiality, integrity and availability. Confidentiality means to protect the information against unauthorized access. Integrity is mentioned as a warranty of authenticity of information; it is also connected with protection against unauthorized interference. Availability means that users have access to the database, but their access needs should be met. The databases security strategy is not only concerning the cryptography. User access control, backup strategy, recovery rules, security audits and using only safe connection methods are also important. All the elements mentioned above are necessary, but nowadays they aren't sufficient.