Information Security In Mobile Databases Essay

2068 words - 8 pages

EXECUTIVE SUMMARY

Mobile devices have started to dominate the world of information technology. Today almost half the people on this planet use mobile devices. The popularity of mobile devices has made the IT industry attracted towards mobile database management which helps users to connect to the database from anywhere and anytime, which was impossible with the traditional database system.

It is still confusing to understand what a mobile database really is so this paper tries to explain what mobile database is. The paper begins with explaining why mobile database has gained popularity and what are its features that has attracted so much attention from the business industry. The paper also explains the requirement for a database to be considered a mobile database. The paper also discusses about some of the currently in use mobile databases in the market. it also looks into some of the issues that arise with mobile database.

Table of Contents
EXECUTIVE SUMMARY II
INTRODUCTION 1
REQUIREMENT OF MOBILE DATABASES 1
SMALL MEMORY FOOTPRINT 2
FLASH-OPTIMIZED STORAGE SYSTEM 2
DATA SYNCHRONIZATION 2
SECURITY 2
LOW POWER CONSUMPTION 3
SELF MANAGEMENT 3
EMBEDDABLE IN APPLICATIONS 3
CURRENT MOBILE DATABASES 3
SYBASE SQL ANYWHERE 4
ORACLE LITE 4
MICROSOFT SQL SERVER 4
COMPACT SQLITE 4
IBM DB2 EVERYPLACE (DB2E) 5
MOBILE DATABASE ISSUES 5
CONNECTIVITY AND DISCONNECTIONS 5
STORAGE CAPACITY 5
SECURITY 6
CONCLUSION 6
REFERENCES 8


INTRODUCTION

Number of mobile devices in use around the world has increase exponentially in
recent years. Number of smartphone users passed 1 billion in 2012 and is predicted to increase by next billion within less than three years. This increasing trend of using mobile device has led the IT industry to focus more on mobile database.
These mobile devices are becoming more powerful than ever and are very lightweight and low cost, which has paved way for data-driven applications. These data-driven applications has enabled users to access any data from anywhere and anytime. Examples: 1) salespersons can update their sales record anytime 2) News database can be updated any time by reporters on the move. 3) Patients medical history can be retrieved any time 4) Consumers can pay their bills through mobile devices. All these utilities of mobile database has led to increase use of mobile database. Mobile DBMSs are required to support these applications data processing capabilities.

Mobile database are either a stationary database that can be connected to by a mobile device such as a smartphones or PDA’s over a mobile network, or a database, which is actually carried by mobile device. Mobile databases work on wireless technology to communicate. It is infeasible to completely replicate large organizational databsase on a mobile devices due to the lack of resources such as storage, battery life and network capacities. At the same time, some on-board storage of data is attractive as communication to...

Find Another Essay On Information Security in Mobile Databases

The Deployment of Security Policy in Information Systems

1556 words - 7 pages , different security solutions have been presented and the best solution is to audit the database logs, actions on database and any alteration on the objects of database to avoid any data modification. Through revolution of information technology (rapid, vast technology) Database auditing implementation should afford the velocity and power full to monitor the database activities. Moreover, we are in a bottle neck, especially with the rapid

The Deployment of Security Policy in Information Systems

1024 words - 5 pages has tested three database auditing tools (AUDIT_TRAIL, LOGMINER, FLASHBACK). In this respect, the results demonstrate the security efficiency for each tool, moreover, the three database auditing tools which have been provided by Oracle enterprise they have been tested in the light of suspicious activities detection. In this work, the researcher explains and clarifies the realistic implementation of database auditing tools, while table (11

The Role of "White Hat" Hackers in Information Security

2076 words - 9 pages individuals doing this work are hired by consulting firms after learning their skills as unpaid hackers. In some cases, consultants are hired to test or to supplement the work of a firm’s computer security staff. In other cases, consultants are hired because a smaller company cannot afford to keep computer security personnel on their Information Services payroll. The firms providing security consulting services come from various segments of the

Security and Consumer Protection in the Information Age

3706 words - 15 pages in a very long time. But thanks to the hard work, good will and a whole lot of people trying to make some money we have come up with ways to defend ourselves from those individuals attempting to use the Internet as a channel to prey on your personal information from afar. Within the research, analysis and implementation of a system of defense from these "criminerds" lays the very heart of information technology policy as it applies to security

Privacy in computers - the effects that unstable security systems can have on large businesses and the threats they deal to databases

650 words - 3 pages information at their own will. This moral right of privacy to an individual is breached and therefore forfeits its privacy.Private records and information that are obtained in computer databases require the best available physical and electronic security available. This will ensure that all data is only accessible to authorised users. Without adequate security, almost any user could log onto these private records and view them accordingly. This opens

Information Security in the Context of Digital Divide in Arab World

1239 words - 5 pages 3- The Multifaceted "Digital Divide" A digital divide is an economic inequality between groups, broadly construed, in terms of access to, use of, or knowledge of information and communication technologies (ICT). The divide within countries can refer to inequalities between individuals, households, businesses, and geographic areas at different socioeconomic and other demographic levels, while the divide between countries is referred to as the

Research in the area of Information Security at Corporate Websites including the role of "Privacy Seals"

3857 words - 15 pages Research in the area of Information Security at Corporate Websites including the role of "Privacy Seals"The moot question that needs to be answered before one starts the analysis of research in the area of web security is to gauge the importance of electronic commerce. Electronic Commerce has taken the world by storm and is perhaps the fastest growing frontiers in the business arena. The sheer statistics tells a story that is often untold and

BYOD in the Enterprise and Health Organizations and  The Affection in Personal and Organizational Privacy Security Information

1413 words - 6 pages implement BYOD, organizations need to establish a chain of infrastructural systems for information and technological software to operate effectively and securely. In the meanwhile, privacy security issues emerge to the surface for both personal and organizational information. The utilization of BYOD increased sharply for all profit and non-for-profit organizations within the past few years. The data collected by Cisco company and The International

the identification and analysis of information system in the business enterprise at each management level, the suitability of information system for the chosen firm, the security of the information...

3968 words - 16 pages Media has the maximum level of security at every level of management and in each of the information system they use. Employee and customer records must be kept secured so that no one can access it. Example: T-Mobile customers' private details were sold to a rival firm. So, in this case security of data is very important. (www.16) (Laudon, K. Pg. 434-442) CLOUD COMPUTING: Cloud computing is a general term for anything that

Organization Databases

843 words - 3 pages party security system, like firewall and anti-virus software, the customer's information could be stolen. ImportanceOne of the advantages of databases is that databases can be published to the web. Publishing to the web allows a customer to be informed about all that he or she needs. In addition, a customer can order directly from our web. Once all information has been filled out on a work order form, the information is in the system. An order can

Databases

841 words - 3 pages party security system, like firewall and anti-virus software, the customer's information could be stolen. ImportanceOne of the advantages of databases is that databases can be published to the web. Publishing to the web allows a customer to be informed about all that he or she needs. In addition, a customer can order directly from our web. Once all information has been filled out on a work order form, the information is in the system. An order can

Similar Essays

Cis 319 Computers And Information Processing Analyzing The Use Of Databases In The Workplace

904 words - 4 pages , inventory, and a wide array of other business information in companies of all sizes.The server-based databases that we use utilize the Structured Query Language (SQL) Server to run security and transactions. The SQL server provides client computers with highly efficient access to database files. SQL is a relational database management system for building business applications with increased data protection. The SQL server acts like an engine

Information Security In America And Sweden

1583 words - 6 pages Introduction: Business today retains a variety of problems, a major one of these problems are breaches in information and consequently society has come up with Information security to help secure peoples privacy. In order to understand why we have information security, one has to first apprehend the value of information. Typical information stored by different businesses and individuals will consist of an assortment of hypersensitive

Why I Am Interested In Information Security

683 words - 3 pages online as an open source for anyone around the world to play around with. Danger still looms. It was with my unearthing of stuxnet, just two months ago, that I recently began an interest in information security. The securitization of our nation’s data is very important. The internet and networks are used for everything from storing an organization’s copyrighted and private data, to storing an individual’s financial and health information. Cyber

Advanced Risk Management In Information Assurance And Security Ncu/Information Security Homework

1988 words - 8 pages system failures from a single attack from compatible systems sharing the same vulnerabilities (Kunreuther & Heal, 2003). However, technology diversity comes with costs. Increased operability issues, compromised network effects, and the loss of economies of scale in having a common software environment (Chen, Kataria, & Krishnan, 2011). These are but a few of the risks to information security and risk management. Assessment of Information Security