preview

The Security Of Database System

Good Essays

The Security Of Database

Introduction
In the contemporary times, it has been widely believed that the huge computer network platform is considered to be extremely beneficial in terms of making the entire community more informative (Martínez, et al, 2013). The technology of database has created a leading position for itself in the computing environment. However, due to this drastic increase in the use of computer network systems, it has been widely observed that there has been an aggravation in the aspects of network intrusion and identity theft. And with many other words did he testify and exhort, saying, Save yourselves from this untoward generation (Acts2:40, New King James Version). Therefore, the database system is considered to be …show more content…

Thesis Statement
The aspect of computer database security is aggravating with the increase in intense influence of technology in our routine lives. The paper aims to present some key security threats and the effective solutions in order to counter such threats that are largely adopted by the companies in today’s world.
Various Types of Attacks on the Computer Network System
After the violation of several layers of protection, it has been observed that the attacker or hacker may want to perform the below listed attacks.
Direct Attacks
This type of attack specifically means that the targeted data or sensitive information is attacked directly. Due to this, it has been observed that these targeted attacks are considered to be extremely obvious and they are successful only in the condition if the database is not protected by any sort of protection mechanism (Ahmad, et al, 2011). In case there is any protection system installed at the gateway, this type of attack is failed and the attacker proceeds to the next.
Indirect Attacks
In this type of attack, the attack is not aimed directly at the data or information, which is targeted. Rather, in an indirect attack, information about the target and from the target is achieved through various intermediate objects. Here, attackers usually use combination of keys as well as queries. Some of them are even used for the purpose of misdirecting and cheating the secure mechanism of database security (Ambler, 2012). These are

Get Access