An Introduction To Access Control Mechanisms

2739 words - 11 pages

Abstract:
With increasing attacks and internal data theft the organizations must strengthen their database security beyond the traditional methods, especially those databases which hold private data. This can be done by developing a security strategy which is a framework of control mechanisms for authentication, authorization, and access control mechanisms to enforce role separation, database auditing, monitoring, network and data encryption, data masking according to the needs and environment in the organization. To develop a high-quality security strategy detailed knowledge and understanding about the database control mechanisms is needed. So the main purpose of this paper is to give a detailed description of security mechanisms which are available till today and build a security strategy according to the needs and environment of the organization. Using the knowledge gained a working prototype which is a security strategy is designed, developed and evaluated for an organization according to the scenario described which contains the challenges or threats and present security mechanisms used in the organization. Finally a security strategy is developed which can help the organization in protecting their information assets and private data from inside and outside attacks.

Introduction:
Databases contain sensitive and important information about an organization. The basic element of any organization is to protect these information resources that support the critical operations of the organization from unauthorized access, modification, or disclosure.
The major threat of the organization is securing its gigabytes of data from the prying eyes of unauthorized outsiders and insiders attempting to exceed their authority. A single intrusion that compromises private data such as credit card numbers or financial data can cause immense damage to an organization, either big or small. Databases will be the prime target of such intrusion attacks, largely because they hold the most valuable data and are vulnerable unless carefully secured.
The purpose of this paper is to explain about intrinsic database security mechanisms for the relational database management systems which will minimize these threats. Database security professionals should develop a security strategy which provides not only the basic security features authentication, authorization, and access control but also aligns database security policies with information security policies; ensure well-defined and formalized database security procedures; enforce role separation; and apply advanced security measures such as database auditing, monitoring, database encryption, data masking, and vulnerability assessment to all critical databases that store private data.

Literature Review:
In this paper “The inference problem: a survey” [Farkas, 2002] the author states that the access control models protects the data from direct access but not from the indirect access via inference...

Find Another Essay On An Introduction to Access Control Mechanisms

An Introduction to Autism Spectrum Disorder

2329 words - 9 pages Introduction to Autism Spectrum Disorder Autism spectrum disorder has become the most common neurological and developmental disorder diagnosed in children today. The United States Centers for Disease Control and Prevention (2012) estimate that 1 out of every 88 American children have been properly diagnosed. There is no known cure for autism, and the inconsistencies of the symptoms of autism in each case make it difficult to target a

An Introduction To Marketing In Leisure

1564 words - 6 pages An Introduction To Marketing In LeisureThe aim of this assignment is to understand the terms 'marketing' and 'selling' and their role within a large organisations, to find the difference between product and customer orientated approaches and to define the differences and similarities between products and services.Definitions of marketing and sellingMarketing;-The Chartered Institute of Marketing (CIM) provides the first definition:&middot

An Introduction to the 3 Idiots, an Award Winning Film

2578 words - 10 pages An Introduction to the 3 Idiots, an Award Winning Film It is from this context that the film 3 Idiots comes. 3 Idiots was a “superhit film” (3 Idiots Triumphs) directed by Rajkumar Hirani and released in 2009. The 3 Idiots is an award winning film with many awards were given specifically for its sound design. 3 Idiots has won more than 20 awards including best sound recording and best sound re-recording from the International Indian Film

Ecology - An Introduction to Ecology and the Biosphere

3396 words - 14 pages An Introduction to Ecology and the BiosphereThe Scope of EcologyI. Ecology (Greek)A. Scientific study of the interactions between organisms and their environmentB. Involve organisms with open systemsC. Naturalists made the process of observing and describing organisms in their natural habitats an end in itselfD. Becoming increasingly experimentalE. Rapidly growing and exciting science due to field experimentsII. The interactions between

Sikhism: An Introduction to a New Religion and Culture

2161 words - 9 pages Sikhism: An Introduction to a New Religion and Culture Throughout the past several years and as a member of a very small religious group, I have made a point to study world religions and their corresponding cultural groups. As such, I feel that I have a decent grasp on the basics of the major world religions -- at least from an outsider’s viewpoint. However, one group I feel I have the least amount of knowledge on is the Sikhs. The tidbits

Maps of Time: An Introduction to Big History

957 words - 4 pages Maps of Time: An Introduction to Big History by historian David Christian explores big history by propagating a “modern creation myth” (2). Christian discusses the history of everything, from the big bang theory to modern day, in a technical and historical narrative. He believes that big history is a new, yet important, area of history ignored by historians. Christian tells us big history is “a coherent story about the past on many different

A Resilient Peoples: An Introduction to the San

2520 words - 10 pages INTRODUCTION According to the widely accepted, Out of Africa Theory, the first appearance of the anatomically modern human originated 200,000 years in Africa. Modern humanity exists today as the species Homo sapiens sapiens, whom are generally characterized by bipedal and upright movement, the use of tools, and a complex brain structure as compared to their ancestral counterparts. All modern humans evolved from fourteen specific “ancestral

Introduction to Philosophy: an essay that offers my own answers to 6 major questions in philosophy

1922 words - 8 pages therefore a cause of belief, and not a reason. The psychological factors are concerned with the reasons on a personal level. We see our beliefs as satisfying the self, giving us a purpose, identity and a sense of belonging to a group. We all have a basic and inbuilt need for direction. But these influences are mere limitations, as we can get personal satisfaction from nonsense. Our experiences and feelings can never be an infallible guide to what is

Gun Control - Let’s Put an End to Gun Licenses

701 words - 3 pages ;     There's nothing wrong about wanting to be exempt from the regulations which the supporters of  gun control have placed on the right to keep and bear arms.  By undergoing the FBI background check required in order to get an FFL, these people have shown that they are law-abiding.  Such low-volume gun "dealers" have been the target of BATF policy makers recently, and many have had their licenses revoked for

"Email Exigency": Risks involed for the employer when he/she allows company email access to an employee.

1269 words - 5 pages The introduction of the Internet has effectively changed the way we do business. This has caused quite a dilemma for both employers and employees. Email and Internet use has been integrated into our daily business practices and an increasing number of employees must have these tools to effectively perform their jobs. This poses many new risks for employers. This essay will examine the circumstances under which employee email could potentially

An Introduction to the Principles of Morals and Legislation by Jeremey Bentham.

1239 words - 5 pages generally considered a moral theory that was found by Jeremey Bentham, a 19th century English philosopher and a social reformer. In 1923, he wrote a book called An Introduction to the Principles of Morals and Legislation. Bentham idea was to understand the concept of happiness and that it is the definitive goal to all human beings. Bentham believes in a principle in which humans should be motivated by pain and pleasure, Bentham said in his book, “Nature

Similar Essays

An Introduction To Marketing Essay

8675 words - 35 pages involves using the media mainly to raise public awareness about their cause, and expose companies which are using unethical or unfair methods.If a business is a targeted by a Pressure group, they will have to act quickly to prevent the situation from getting out of control. A company can very quickly gain negative publicity if the pressure group uses the media to full effect.For example, Subway could be under pressure from an environmental group such

An Introduction To Globalization Essay

2364 words - 9 pages , Faculty Club International, McWorld Culture, and Evangelical Protestantism. Each of these faces is represented by a different group of people and, although I will not go through each of them here, when you read the essay try to identify their common features. One of them, as it is probably not be surprising to you, is the implicit (in some faces explicit) assumption that those forces are led and determined by the dominant West, especially Americans. Well, I hope this brief introduction on the topic was of help to you. Globalization is an inexhaustible subject and thus we will always have something else to learn!

Growth Of, Control Of, And Access To The Internet

4299 words - 17 pages communication in the form of email. Information can be sent to anyone who has access to a computer and the Internet. The Internet allows people to express their feelings and emotions anonymously. However, governments have looked to control information from the Internet. This presents a battle between freedom of speech and censorship by the government. With the terror attacks of September 11, 2001, governments have increased the security in order to

An Introduction To Expert Systems Essay

1845 words - 7 pages An Insight into Expert Systems Abstract To improve speed of operations, programming practices for practical purposes are moving away from the data centric, procedural problem solving paradigm to a heuristic, declarative problem solving paradigm. Though theoretically there is no guarantee that a solution shall be found and even if it is found, that it be correct, practically it has been proven that expert systems employing , heuristics are