Database Security Concerns The Use of A Broad Range of Information Security Controls To Protect
Database Security Concerns The Use of A Broad Range of Information Security Controls To Protect
Database security refers to the collective measures used to protect and secure a database or
database management software from illegitimate use and malicious threats and attacks.
It is a broad term that includes a multitude of processes, tools and methodologies that ensure
security within a database environment.
Database security concerns the use of a broad range of information security controls to protect
databases (potentially including the data, the database applications or stored functions, the
database systems, the database servers and the associated network links) against compromises of
their confidentiality, integrity and availability. It involves various types or categories of controls, such
as technical, procedural/administrative and physical. Database security is a specialist topic within the
broader realms of computer security, information security and risk management.
Restricting unauthorized access and use by implementing strong and multifactor access and
data management controls.
Load/stress testing and capacity testing of a database to ensure it does not crash in a
distributed denial of service (DDoS) attack or user overload.
Physical security of the database server and backup equipment from theft and natural
disasters
Reviewing existing system for any known or unknown vulnerabilities and defining and
implementing a road map/plan to mitigate them.
Physical damage to database servers caused by computer room fires or floods, overheating,
lightning, accidental liquid spills, static discharge, electronic breakdowns/equipment failures and
obsolescence;
Design flaws and programming bugs in databases and the associated programs and
systems, creating various security vulnerabilities (e.g. unauthorized privilege escalation), data
loss/corruption, performance degradation etc.;
Data corruption and/or loss caused by the entry of invalid data or commands, mistakes in
database or system administration processes, sabotage/criminal damage etc.
1.
SSL (Secure Sockets Layer) is the standard security technology for establishing
an encrypted link between a web server and a browser. This link ensures that all data
passed between the web server and browsers remain private and integral.
The Secure Socket Layer (SSL) and Transport Layer Security (TLS) is the most widely
deployed security protocol used today. It is essentially a protocol that provides a secure
channel between two machines operating over the Internet or an internal network. In todays
Internet focused world, the SSL protocol is typically used when a web browser needs to
securely connect to a web server over the inherently insecure Internet.
Technically, SSL is a transparent protocol which requires little interaction from the end user
when establishing a secure session. In the case of a browser for instance, users are alerted
to the presence of SSL when the browser displays a padlock, or, in the case of Extended
Validation SSL, when the address bar displays both a padlock and a green bar. This is the
key to the success of SSL it is an incredibly simple experience for end users
Secure Electronic Transaction- Although the technology already is in place, Icommerce (Internet Commerce) hasnt really taken off. The primary reason for this
reluctance is that most consumers still consider financial transactions over the
Internet unsafe. In Europe the use of credit cards online is further hindered by
national legislation, that in some countries prohibit online credit card transactions
because these are considered not fulfill the requirement that all card transactions
must be physically signed by the cardholder. In order to eliminate this barrier to the
evolution of Icommerce, a consortium headed by Visa and MasterCard has
developed a standard for secure electronic transactions (SET). SET is a complex
standard combining advanced cryptography for safe data transfer, and hashing
technologies for data integrity, with digital certificates for authentication of the
parties involved in the transaction. Being such a complicated standard there have
been quite some problems with developing and now with implementing it. Another
is the issue of systems integration between merchant side SET-applications and the
business systems already in use. These and many 8 other must be answered before
we can expect SET to become a widely implemented standard.
The purpose of this Project is to research how Internet commerce applications can
be made SET compliant, and to develop a prototype that clarifies the systems
integration process and the main problem areas of the technology involved.. The
task is to develop a prototype to evaluate the difficulties of systems integration
between the SET application and the merchant I-commerce system.
Q4>what is antivirus software and how does it work
An anti-virus software program is a computer program that can be used to scan files to identify and
eliminate computer viruses and other malicious software(malware).
Anti-virus software typically uses two different techniques to accomplish this:
Identifying suspicious behavior from any computer program which might indicate infection
Most commercial anti-virus software uses both of these approaches, with an emphasis on the virus
dictionary approach.
Virus dictionary approach
In the virus dictionary approach, when the anti-virus software examines a file, it refers to a dictionary
of known viruses that have been identified by the author of the anti-virus software. If a piece of code
in the file matches any virus identified in the dictionary, then the anti-virus software can then either
delete the file, quarantine it so that the file is inaccessible to other programs and its virus is unable to
spread, or attempt to repair the file by removing the virus itself from the file.
To be successful in the medium and long term, the virus dictionary approach requires periodic online
downloads of updated virus dictionary entries. As new viruses are identified "in the wild", civically
minded and technically inclined users can send their infected files to the authors of anti-virus software,
who then include information about the new viruses in their dictionaries.
Dictionary-based anti-virus software typically examines files when the computer's operating system
creates, opens, and closes them; and when the files are e-mailed. In this way, a known virus can be
detected immediately upon receipt. The software can also typically be scheduled to examine all files
on the user's hard disk on a regular basis.
There are various methods of encrypting and packing malicious software which will make even wellknown viruses undetectable to anti-virus software. Detecting these "camouflaged" viruses requires a
powerful unpacking engine, which can decrypt the files before examining them. Unfortunately, many
popular anti-virus programs do not have this and thus are often unable to detect encrypted viruses.
Companies that sell anti-virus software seem to have a financial incentive for viruses to be written and
to spread, and for the public to panic over the threat.
Wireless networking routers are wireless networking components that act as a gateway between an
Internet connection, such as a cable modem, and a wireless network. Broadband routers are a
combination of an access point and a switch, usually consisting of four Ethernet ports to allow more
devices on the network, such as a printer, and a wide area network (WAN) port for the broadband
connection. Broadband wireless routers include built-in dynamic host configuration protocol (DHCP)
servers, which automatically assign IP addresses to each device connected to the router. The benefit of a
wireless networking router over a wireless hub is the multiple connection capability and additional security
features, such as a firewall.
Most computers produced today come with built-in wireless adapters that automatically detect a wireless
network. Older computers can be outfitted with wireless network components such as a wireless
networking card. Wireless networking cards detect and interface with a wireless network and come in a
variety of networking standards.