Database Security –Threats & Prevention

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2019 by IJCTT Journal
Volume-67 Issue-5
Year of Publication : 2019
Authors : Simanta Shekhar Sarmah
DOI :  10.14445/22312803/IJCTT-V67I5P108

MLA

MLA Style:Simanta Shekhar Sarmah"Database Security –Threats & Prevention" International Journal of Computer Trends and Technology 67.5 (2019): 46-53.

APA Style:Simanta Shekhar Sarmah (2019). Database Security –Threats & Prevention International Journal of Computer Trends and Technology, 67(5), 46-53.

Abstract
Information security is vital. It conditions the economic activity of companies and the trust in public bodies voluntary or accidental disclosure of financial or private data can have unfortunate consequences economic, commercial and ... legal, around 25% of incidents are internal staff, 50% are due to loss or theft of miscellaneous equipment. What is the security of IT and methodology of security management of IT? What is the concept of penetration database? How to Secure databases and ensuring compliance? what are the strategic and technical security measures for good database security?

Reference
[1] Malik, Mubina, and Trisha Patel. "Database securityattacks and control methods." International Journal of Information 6.1/2 (2016): 175-183.
[2] Shivnandan Singh, Rakesh Kumar Rai, A Review Report on Security Threats on Database, International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014.
[3] Simanta Shekhar Sarmah, Data Migration, Science and Technology, Vol. 8 No. 1, 2018, pp. 1-10. doi: 10.5923/j.scit.20180801.01
[4] Bertino, Elisa, and Ravi Sandhu. "Database security-concepts, approaches, and challenges." IEEE Transactions on Dependable and secure computing 1 (2005): 2-19.
[5] Shah, Arun, Robert F. Novy, and Robert A. Ertl. "Database security." U.S. Patent No. 7,167,859. 23 Jan. 2007.
[6] Cook, William R., and Martin R. Gannholm. "Rule based database security system and method." U.S. Patent No. 6,820,082. 16 Nov. 2004.
[7] Bertino, Elisa, Sushil Jajodia, and PierangelaSamarati. "Database security: research and practice." Information systems 20.7 (1995): 537-556.
[8] Pernul, Günther. "Database security." Advances in Computers. Vol. 38. Elsevier, 1994. 1-72.
[9] Lunt, Teresa F., and Eduardo B. Fernandez. "Database security." IEEE Data Eng. Bull. 13.4 (1990): 43-50.
[10] Garvey, Thomas D., and Teresa F. Lunt. "Cover Stories for Database Security." DBSec. 1991.
[11] Davida, George I., et al. "Database security." IEEE Transactions on Software Engineering 6 (1978): 531-533.
[12] Murray, Meg C. "Database security: What students need to know." Journal of information technology education: Innovations in practice 9 (2010): IIP-61.
[13] Burtescu, Emil. "Database security-attacks and control methods." journal of applied quantitative methods 4.4 (2009): 449-454.
[14] Shulman, Amichai, and C. T. O. Co-founder. "Top ten database security threats." How to Mitigate the Most Significant Database Vulnerabilities (2006).
[15] Basta, Alfred, and Melissa Zgola. Database security. Cengage Learning, 2011.
[16] Sarmah, S. (2019). Data Migration. [online] Article.sapub.org. Available at: http://article.sapub.org/10.5923.j.scit.20180801.01.html [Accessed 6 May 2019].
[17] Sourav Mukherjee "Popular SQL Server Database Encryption Choices" International Journal of Engineering Trends and Technology 66.1 (2018): 14-19.
[18] MonaliSachinKawalkar, Dr. P. K. Butey "An Approach for Detecting and Preventing SQL Injection and Cross Site Scripting Attacks using Query sanitization with regular expression". International Journal of Computer Trends and Technology (IJCTT) V49(4):237-245, July 2017.

Keywords
Cybersecurity, Database protection, Threats to a database, Information assurance, Security measures, Information security