Database Security




Data Security

Database security is generally planned there are some implemented and maintained by the database administrator or other information security professional. There are some ways database security are analyzed or implemented, that includes the restricting the unauthorized access and the use of implementing strong and multifactor access and data management controls ,Load/stress testing and capacity testing of a database to ensure it does not crash in a distributed denial of service (DDoS) attack or user overload ,Physical security of the database server and backup equipment from theft and natural disasters and the Reviewing existing system for any known or unknown vulnerabilities and defining and implementing a road map/plan to mitigate them. One of the most commonly encountered methods of practicing data security is the use of authentication. With authentication, users must provide a password, code, biometric data, or some other form of data to verify identity before access to a system or data is granted.

Data security has also different technologies like data masking, data encryption, data erasures etc. Data security also helps in protecting data from hacking and other illegal activities that can cause damage of important information.

It is the collective measures that are used to protect and secure the database management software from this illegitimate use, malicious threats and attacks. It is a term that includes a multitude of processes, tools and methodologies that may ensure security within a database environment. Database security covers or enforces security on all aspects and components of databases. This includes, data stored in database, database server, database management system (DBMS), and other database workflow applications.

And generally planned, there are some implemented and maintained by the database administrator or other information security professional. There are some ways database security are analyzed or implemented, that includes the restricting the unauthorized access and the use of implementing strong and multifactor access and data management controls ,Load/stress testing and capacity testing of a database to ensure it does not crash in a distributed denial of service (DDoS) attack or user overload, Physical security of the database server and backup equipment from theft and natural disasters and the Reviewing existing system for any known or unknown vulnerabilities and defining and implementing a road map/plan to mitigate them.Examples of data security technologies include backups, data masking and data erasure. A key data security technology measure is encryption, where digital data, software/hardware, and hard drives are encrypted and therefore rendered unreadable to unauthorized users and hackers.

One of the most commonly encountered methods of practicing data security is the use of authentication. With authentication, users must provide a password, code, biometric. Data or some other form of data to verify identity before access to a system or data is granted.

Data security is also very important for health care records, so health advocates and medical practitioners in the U.S. and other countries are working toward implementing electronic medical record (EMR) privacy by creating awareness about patient rights related to the release of data to laboratories, physicians, hospitals and other medical facilities refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Data security also protects data from corruption. Data security is an essential aspect of IT for organizations of every size and type.

Data security is also known as information security (IS) or computer security.

In simple terms, data security is the practice of keeping data protected from corruption and unauthorized access. The focus behind data security is to ensure privacy while protecting personal or corporate data. Data is the raw form of information stored as columns and rows in our databases, network servers and personal computers. This may be a wide range of information from personal files and intellectual property to market analytics and details intended to top secret. Data could be anything of interest that can be read or otherwise interpreted in human form.

However, some of this information isn't intended to leave the system. The unauthorized access of this data could lead to numerous problems for the larger corporation or even the personal home user. Having your bank account details stolen is just as damaging as the system administrator who was just robbed for the client information in their database.






There has been a huge emphasis on data security as of late, largely because of the internet. There are a number of options for locking down your data from software solutions to hardware mechanisms. A computer user is certainly more conscious these days, but is your data really secure? If you're not following the essential guidelines, your sensitive information just may be at risk.

Encryption

Encryption has become a critical security feature for thriving networks and active home users alike. This security mechanism uses mathematical schemes and algorithms to scramble data into unreadable text. It can only by decoded or decrypted by the party that possesses the associated key.
(FDE) Full-disk encryption offers some of the best protection available. This technology enables you to encrypt every piece of data on a disk or hard disk drive. Full disk encryption is even more powerful when hardware solutions are used in conjunction with software components. This combination is often referred to as end-based or end-point full disk encryption.

Strong User Authentication

Authentication is another part of data security that we encounter with everyday computer usage. Just think about when you log into your email or blog account. That single sign-on process is a form authentication that allows you to log into applications, files, folders and even an entire computer system. Once logged in, you have various given privileges until logging out. Some systems will cancel a session if your machine has been idle for a certain amount of time, requiring that you prove authentication once again to re-enter.



The single sign-on scheme is also implemented into strong user authentication systems. However, it requires individuals to login using multiple factors of authentication. This may include a password, a one-time password, a smart card or even a fingerprint.

Backup Solutions

Data security wouldn't be complete without a solution to backup your critical information. Though it may appear secure while confined away in a machine, there is always a chance that your data can be compromised. You could suddenly be hit with a malware infection where a virus destroys all of your files. Someone could enter your computer and thieve data by sliding through a security hole in the operating system. Perhaps it was an inside job that caused your business to lose those sensitive reports. If all else fails, a reliable backup solution will allow you to restore your data instead of starting completely from scratch. 


Researchers :

Group Leader: Lelis, Jay Lorenz
Members
Atanante, Austinne Khyle
Balbas, Brylle Milkins
Balasbas, Philip Joshua
Lojares, Leonard

Comments