- Security is defined as the level and degree free from danger and threats.
- Database security can be briefly as the degree to which data is fully protected from unauthorized tampering.
- Information systems are the backbone of the day-to-day company operations as well as the guide for long-term strategies.
- A typical information system consists of data, procedures, hardware, software, networks and people.
- A client/server application is based on the business relationship in which the customer requests an order or service and the server responds to the request.
- A tier is a logical or physical platform in client/server architecture.
- DBMS from different vendors vary in distinct implementation and architecture but they have close to the same functionality.
- The basic function of DBMS is to enable developers and administrators to organize data; store manipulate, and retrieve data efficiently; enforce data referential integrity; and provide a security mechanism to protect the data.
- Most companies employ an information security department to protect data and information.
- The concepts of information security is based on C.I.A triangle
- There are two components to confidentiality: preventing unauthorized individuals from knowing or accessing secretive information, and keeping confidential information secret by not disclosing it to unauthorized individuals.
- Data is considered to have integrity if it is accurate and has not been intentionally or unintentionally tampered with .
- System availability is measured by now accessible the system is to individual who are to access information and how free individuals are to manipulate data.
- Database environment components are people, applications, networks, operating system based management system, data files, and finally data.
- Data is the most asset of the database environment.
- An access point is a gateway that requires measures to limit database secirty violation
- A security access point is a point where security measure are needed to prevent access authorized action.
- Vulnerability is defined as being susceptible to attack.
- A threat is defined as an indication of implementation danger to harm.
- A security risk is a result of a threat, which is a result of vulnerability.
- Information security architecture is a model for protecting logical and physical assets.
- Information security architecture is the overall design of a company implementation of C.I.A triangle.
- Components of information security architecture include policies and procedures, secure personal and administrators, detection equipment, security programs, monitoring equal monitoring applications, and auditing procedures and tools.
- Database management system empower the database administrator to implement any security at all levels of the database.
- The security access points are people, applications, networks, operating system, DBM and data.
|