0% found this document useful (0 votes)
12 views2 pages

Week 8 Reviewer

Reviewer

Uploaded by

BoSs Gaming
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views2 pages

Week 8 Reviewer

Reviewer

Uploaded by

BoSs Gaming
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

1

GUAGUA COMMUNITY COLLEGE

Information Security and Management


Week 8 Reviewer Paper
Midterm Period

Security in Database Management Database Security


System encompasses measures and techniques
implemented to protect databases from
- software system that enables users to unauthorized access, misuse, modification,
define, create, maintain, and control access or destruction. It involves safeguarding
to databases. It provides an interface for sensitive data stored within databases
users and applications to interact with the against various threats, including
database by performing operations such as malicious attacks, insider threats, and
storing, retrieving, updating, and deleting accidental data breaches.
data.
Importance of Database Security:
Significance in Modern Computing: • Sensitive Data Protection - Databases
• Data Organization - structures data store critical information like PII and
efficiently for storage and retrieval, vital financial records. Maintaining
for managing large data volumes across confidentiality, integrity, and availability
various applications. is essential to prevent unauthorized
• Data Integrity - ensures data accuracy access.
and consistency, preventing errors from • Competitive Advantage - Effective
concurrent access or incorrect operations. database security enhances customer
• Data Security - implements mechanisms trust and demonstrates commitment to
to secure data, control access, and data protection, giving organizations a
prevent unauthorized manipulation or competitive edge.
disclosure, crucial in today's • Intellectual Property (IP) Protection -
interconnected environment. Databases often house valuable IP, such
• Concurrency Control - manages as trade secrets and proprietary
simultaneous data access, avoiding algorithms. Protecting this IP from theft
conflicts and ensuring reliable or unauthorized access is vital for
transaction execution. competitiveness and innovation.
• Scalability and Performance - DBMS • Global Compliance - In a globalized
efficiently handles large-scale data business environment, database security
operations, scaling to accommodate ensures compliance with data protection
growth and optimizing performance for regulations across international borders,
rapid processing. maintaining data security and legal
compliance.

ISM Prepared by: Prof. Aymit A. Manalungsung


2
GUAGUA COMMUNITY COLLEGE

• Data Sovereignty - Compliance with organizations to implement detection


data sovereignty laws requires aligning and mitigation measures.
database security measures with specific
data residency requirements to avoid
legal consequences.

Over time, database security concerns


have evolved in response to advancements
in technology, changes in threat landscape,
and regulatory developments. Initially,
database security primarily focused on
perimeter defense and access controls to
prevent unauthorized access to databases.

However, with the proliferation of internet


connectivity, mobile devices, and cloud
computing, new challenges emerged,
including:

• Expanded Attack Surface - Network


expansion and distributed architectures
have broadened the attack surface,
exposing databases to more threats like
external attacks and insider breaches.
• Sophisticated Threats - Advanced
cyber threats like SQL injection,
malware, and APTs exploit
vulnerabilities and weak authentication
to compromise databases and steal
sensitive data.
• Data Privacy Regulations -
Regulations like GDPR and CCPA
underscore the importance of
protecting personal data, requiring
robust security measures and controls.
• Insider Threat Focus - Insider
threats, posed by employees or
privileged users, are recognized as
significant risks, prompting

ISM Prepared by: Prof. Aymit A. Manalungsung

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy