More Subjects
Database Security Management
[Name of the Writer]
[Name of the Institution]
Database Security Management
Part 1
In this day and age, it is very important to ensure that the security aspect is being taken care off during the course of the development of the software. In order to make sure that it happens, one of the first thing that has to be done is to make sure that the general guidelines must be set with regards to the way how the software development protocols are going to be working out. The other thing that is very important is to make sure that the security control starts, and aspects are needed to be looked after in every stage such as design state, development stage and specially testing stage.
Part 2
In order to make sure that there is security enhancement in the database protocol, the most important thing that has to be taken care off is to make sure that there has to be focus in terms of the way security of the design is going to be taken care off. At the same effort, must be made to ensure that the view-based access control and Polyinstantiation is done to enhance the database security protocols. With the increase in the data demand due to the data mining and data warehousing concepts where large data is stored, the importance of database security has been enhanced.
Part 3
Acid method is the set of properties of the database connection to guarantee greater validity.
Atomicity is the invisible and irreducible series of operations that occur when appropriate decision making has to be made.
Consistency in the database systems means when the change can only affect the database in certain ways only without bringing wholesale changes.
Isolation is the ability of the user to extract information from the database.
Durability is the ACID property that goes to show the ability of the database with regards to how it can sustain the information.
References
Anciaux, N., Bouganim, L., & Pucheral, P. (2017). Future trends in secure chip data managemen. IEEE Data Engineering Bulletin, 30(3), 49-57.
Hoffer, J. A., & Alexander, M. B. (2018). The diffusion of database machines. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 23(2), 13-19.
More Subjects
Join our mailing list
© All Rights Reserved 2023