Studyspark Study Document

Database Security and SQL Injection Research Proposal

Pages:1 (364 words)

Sources:1+

Subject:Technology

Topic:Database Security

Document Type:Research Proposal

Document:#39063247


Database designers and administrators can work concomitantly with it professionals and researchers to implement the security measures necessary to mitigate risks to data.

I have been a database user at my company for a number of years. As such, I am allowed access from only a limited number of locations; one static connection at home, one at work, and one laptop connection that I carry with me when traveling. Each connection has its own password, which is updated on a daily basis. I create the passwords myself, and nobody else has access to these. The it department has provided me with training in optimizing the strength and security of my passwords. Security at my company is extremely important, as data leak could for example lead to a compromise of our competitive edge.

Sources

Chapple, Mike. Database Security: A Fine Balance Between Roles and Rights. About.com http://databases.about.com/od/security/a/databaseroles.htm

Chapple, Mike. SQL Injection Attacks on Databases. About.com. http://databases.about.com/od/security/a/sqlinjection.htm


Sample Source(s) Used

Sources

Chapple, Mike. Database Security: A Fine Balance Between Roles and Rights. About.com http://databases.about.com/od/security/a/databaseroles.htm

Chapple, Mike. SQL Injection Attacks on Databases. About.com. http://databases.about.com/od/security/a/sqlinjection.htm

Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Database Security

Pages: 9 (2424 words) Sources: 1+ Subject: Education - Computers Document: #3582604

Database Security The focus of this study is that of database security. Databases and database technology are such that play critical roles in the use of computers whether it be in business, electronic commerce, engineering, medicine, genetics, law, education or other such entities requiring the use of computer technology. A database is quite simply a collection of data that is related such as a database containing customer information, supplier information, employee

Studyspark Study Document

Database Security Design of an

Pages: 11 (2976 words) Sources: 1+ Subject: Education - Computers Document: #78984111

With optimistic concurrency control, the database checks resources to determine if any conflicts have occurred only when attempting to change data. If a conflict occurs, the application must read the data and attempt the change again. Pessimistic concurrency, on the other hand, control locks resources as they are required, for the duration of a transaction. Unless deadlocks occur, a transaction is assured of successful completion 5.5 Audit Tracking Although auditing does

Studyspark Study Document

Database Administrator for Department Store

Pages: 13 (3901 words) Sources: 7 Subject: Business Document: #99540996

Database Administrator for Department Store Scenario The department store has expanded in the local region by opening five more bookstores, and the bookstore has launched a series of marketing campaign to increase sales and attract new customers. The objective of this technical report is to develop a plan to create and maintain an enterprise-wide database system that will assist the bookstore to hold the inventory and sales data. The database design will

Studyspark Study Document

Database Management Today, Nearly Everyone in Across

Pages: 3 (807 words) Subject: Education - Computers Document: #44746935

Database Management Today, nearly everyone in across the world would love to store their information in the database to keep track of everyday activities. Organizations are also not left behind in operating their businesses by storing their information on databases. Databases are designed in a way they offer organized mechanisms for storage, managing and retrieving information. The data are stored and organized in different tables by the use of Microsoft Excel

Studyspark Study Document

Security Auditing Strategy for FX Hospital EHR EMR Website

Pages: 10 (2990 words) Sources: 5 Subject: Sports - Drugs Document: #97278498

Security Audit for FX Hospital EHR/EMR Systems The study carries out the security audits for the FX Hospital EHR/EMR information systems to identify the vulnerabilities in the systems. The study uses the BackTrack as an auditing tool to penetrate the website, and outcomes of the auditing reveal that the website is not secure and can be subject to different vulnerabilities. After carrying out the auditing, the study is able to collect

Studyspark Study Document

Security Issues Creating a Site

Pages: 17 (4754 words) Sources: 15 Subject: Education - Computers Document: #58026537

Even though there is always some form of a risk involved in the coding technique together with the deployment methods of a website, some technologies such as PHP and MySQL form some of the worst aggravators of online website security. The loopholes that exists in the use of these technologies results in some of the worst hack attacks and security breaches ever experienced in the field of web design. The

Join thousands of other students and

"spark your studies".