We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2
1
GUAGUA COMMUNITY COLLEGE
Information Security and Management
Week 8 Reviewer Paper Midterm Period
Security in Database Management Database Security
System encompasses measures and techniques implemented to protect databases from - software system that enables users to unauthorized access, misuse, modification, define, create, maintain, and control access or destruction. It involves safeguarding to databases. It provides an interface for sensitive data stored within databases users and applications to interact with the against various threats, including database by performing operations such as malicious attacks, insider threats, and storing, retrieving, updating, and deleting accidental data breaches. data. Importance of Database Security: Significance in Modern Computing: • Sensitive Data Protection - Databases • Data Organization - structures data store critical information like PII and efficiently for storage and retrieval, vital financial records. Maintaining for managing large data volumes across confidentiality, integrity, and availability various applications. is essential to prevent unauthorized • Data Integrity - ensures data accuracy access. and consistency, preventing errors from • Competitive Advantage - Effective concurrent access or incorrect operations. database security enhances customer • Data Security - implements mechanisms trust and demonstrates commitment to to secure data, control access, and data protection, giving organizations a prevent unauthorized manipulation or competitive edge. disclosure, crucial in today's • Intellectual Property (IP) Protection - interconnected environment. Databases often house valuable IP, such • Concurrency Control - manages as trade secrets and proprietary simultaneous data access, avoiding algorithms. Protecting this IP from theft conflicts and ensuring reliable or unauthorized access is vital for transaction execution. competitiveness and innovation. • Scalability and Performance - DBMS • Global Compliance - In a globalized efficiently handles large-scale data business environment, database security operations, scaling to accommodate ensures compliance with data protection growth and optimizing performance for regulations across international borders, rapid processing. maintaining data security and legal compliance.
ISM Prepared by: Prof. Aymit A. Manalungsung
2 GUAGUA COMMUNITY COLLEGE
• Data Sovereignty - Compliance with organizations to implement detection
data sovereignty laws requires aligning and mitigation measures. database security measures with specific data residency requirements to avoid legal consequences.
Over time, database security concerns
have evolved in response to advancements in technology, changes in threat landscape, and regulatory developments. Initially, database security primarily focused on perimeter defense and access controls to prevent unauthorized access to databases.
However, with the proliferation of internet
connectivity, mobile devices, and cloud computing, new challenges emerged, including:
• Expanded Attack Surface - Network
expansion and distributed architectures have broadened the attack surface, exposing databases to more threats like external attacks and insider breaches. • Sophisticated Threats - Advanced cyber threats like SQL injection, malware, and APTs exploit vulnerabilities and weak authentication to compromise databases and steal sensitive data. • Data Privacy Regulations - Regulations like GDPR and CCPA underscore the importance of protecting personal data, requiring robust security measures and controls. • Insider Threat Focus - Insider threats, posed by employees or privileged users, are recognized as significant risks, prompting