Studyspark Study Document

Database Security Over the Last Article Review

Pages:2 (904 words)

Sources:2

Subject:Technology

Topic:Database Security

Document Type:Article Review

Document:#29136499




Strengths vs. Weaknesses

The article 2007 Survey on Database Security; highlights the most pressing issues that could be facing an organization (someone from within who could have access to the data). Where, this strength points out a situation that many it managers are overlooking. However, the weakness of the article is that it points out the problem, while at the same time saying there is no effective solution. In many ways this is the equivalent of point out a fire and then not having the tools to put it out. (Ponemon, 2010)

The article How to Secure Sensitive Data in a Cloud Environment; highlights how many businesses are turning to virtual networks to perform many functions. The biggest strengths of the article are: the overall dangers it points with this type of it protocol and how an organization can address these issues. The main weakness of the article is that it only has two solutions. tThis is problematic because businesses need a number of different tools, to adapt to the changing threats that are being encountered on a daily basis. (Markovich, 2010)

The Differences between the Two

The peer reviewed article (2007 Survey on Database Security) is obviously more focused on pointing out issues that could become a problem over the long-term. This is because the issues that are being identified could be just emerging as possible situation, based upon their interviews with it managers. Therefore, a solution for the problem presented may not be available. The media reviewed article (How to Secure Sensitive Data in a Cloud Environment) highlights current issues that are facing businesses over the short to medium term. Where, the article will identify the problems and will then point out different solutions that can be implemented.

What the two different articles highlight, is that the overall focus on the various it related issues are different, with both showing two critical problems. As a result, the extent of the issues covered will be more in depth in the peer reviewed article, as opposed to the main stream media article. This is because the audience is more technically focused and the content from the peer viewed article, must address issues that are most important to them. Therefore, one can easily see how the accuracy elements are consistent, but the focus of the articles will be geared to reflect the intended audience.

Bibliography

Markovich, S. (2010). How to Secure Sensitive Data in a Cloud Environment. Retrieved May 14, 2010 from E. Week website: http://www.eweek.com/c/a/Cloud-Computing/How-to-Secure-Sensitive-Data-in-Cloud-Environments/

Ponemon, L (2007). 2007 Survey on Database Security. Retrieved May 14, 2010 from Appsec Inc. website: http://www.appsecinc.com/techdocs/whitepapers/2007-Ponemon-Database-Security-Study-Sponsored-by-Application-Security-Inc.pdf


Sample Source(s) Used

Bibliography

Markovich, S. (2010). How to Secure Sensitive Data in a Cloud Environment. Retrieved May 14, 2010 from E. Week website: http://www.eweek.com/c/a/Cloud-Computing/How-to-Secure-Sensitive-Data-in-Cloud-Environments/

Ponemon, L (2007). 2007 Survey on Database Security. Retrieved May 14, 2010 from Appsec Inc. website: http://www.appsecinc.com/techdocs/whitepapers/2007-Ponemon-Database-Security-Study-Sponsored-by-Application-Security-Inc.pdf

Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Database Security

Pages: 9 (2424 words) Sources: 1+ Subject: Education - Computers Document: #3582604

Database Security The focus of this study is that of database security. Databases and database technology are such that play critical roles in the use of computers whether it be in business, electronic commerce, engineering, medicine, genetics, law, education or other such entities requiring the use of computer technology. A database is quite simply a collection of data that is related such as a database containing customer information, supplier information, employee

Studyspark Study Document

Database Security Plan and Requirements Definition for

Pages: 8 (2108 words) Sources: 6 Subject: Education - Computers Document: #78636677

Database Security Plan and Requirements Definition for a University Department The database security plan and requirements definition were developed. The plan included, at the outset, the inclusion of major stakeholder at the University and described their roles in initiating, implementing, and maintaining the plan. Individuals responsible for daily and other periodic tasks were developed. A major consideration in planning the security was the policy that governs granting of access. The need-to-know,

Studyspark Study Document

Databases and Regulatory Compliance Challenges

Pages: 13 (3434 words) Sources: 1+ Subject: Education - Computers Document: #75953507

Databases and Regulatory Compliance Challenges The advent of technology has increased the popularity of database usage in firms, yet the legislation regulating the field has yet to be finalized. The changing nature of the IT sector, coupled with the legislative traits, creates several situations in which the companies find it difficult to comply with the regulations. This paper recognizes some of those difficulties, and also proposes some solutions. Databases Regulatory challenges for databases No

Studyspark Study Document

Databases in the Workplace

Pages: 3 (799 words) Subject: Education - Computers Document: #67641088

Databases in the Work Place We are in the information age and the effective management of data is paramount in almost all aspects of our life. All businesses today thrive on the availability of vast pool of data pertaining to their domain and thus databases constitute an indispensable aspect of all businesses. Having access to a huge database and the intelligent interpretation of the data therein holds the key to business

Studyspark Study Document

Database Security Backup or Recovery

Pages: 7 (2090 words) Subject: Computer Science Document: #98484993

Part 1: Concurrency Issues in the Database
1. Considering that these various transactions use some of the same tables and fields in the database, explain why it is important for the changes made by each of these transactions to be atomic. (2 pts)
Answer: The necessity of an atomic transaction, in this case, is to maintain state consistency in the database system. Since various transactions require the use of the

Studyspark Study Document

Database Administrator for Department Store

Pages: 13 (3901 words) Sources: 7 Subject: Business Document: #99540996

Database Administrator for Department Store Scenario The department store has expanded in the local region by opening five more bookstores, and the bookstore has launched a series of marketing campaign to increase sales and attract new customers. The objective of this technical report is to develop a plan to create and maintain an enterprise-wide database system that will assist the bookstore to hold the inventory and sales data. The database design will

Join thousands of other students and

"spark your studies".