International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 121 | Views: 287 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers | Computer Science & Engineering | Nigeria | Volume 6 Issue 8, August 2017 | Popularity: 6.4 / 10


     

Database Security Issues: A Review

Ogbonna J. C., Nwokoma F. O., Ejem A.


Abstract: Database security such as confidentiality, integrity, and availability of data/information stored in a database is one of the most crucial and major challenges in the world of Information and Communication Technology. Inaccuracy/Loss of data stored in a database in some cases may be regarded as a loss of human life. That is to say that, database may provide false information that could render the entire organization hopeless if not well protected, and so techniques that protects database from attackers, and any kind of corruption should be carefully implemented and should be given a higher priority. The major factors to consider in database security issues include how to prevent unauthorized access to data, how to prevent unauthorized manipulation of data, as well as how to insure the availability of data when needed. This paper aims at reviewing various database security issues such as data confidentiality requirements, data integrity requirements, and data availability requirements.


Keywords: Database security, security techniques, database integrity, database threats


Edition: Volume 6 Issue 8, August 2017


Pages: 1812 - 1816


DOI: https://www.doi.org/10.21275/ART20176415



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Ogbonna J. C., Nwokoma F. O., Ejem A., "Database Security Issues: A Review", International Journal of Science and Research (IJSR), Volume 6 Issue 8, August 2017, pp. 1812-1816, https://www.ijsr.net/getabstract.php?paperid=ART20176415, DOI: https://www.doi.org/10.21275/ART20176415



Similar Articles

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2386 - 2390

GMFAD and CDAL-M Models for Identification of Adversary Attacks in Wireless Sensor Network using RSS

Santosh S. Doifode, D. C. Mehetre

Share this Article

Downloads: 106

Comparative Studies, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 193 - 195

Application for Detecting and Preventing SQL Injection Attacks using Web Service

Anuja A. Patil, Ketaki H. Pangu

Share this Article

Downloads: 106 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

Downloads: 107

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 1613 - 1618

Review of Various Encryption and Compression Mechanisms Used within Deduplication in Cloud Computing

Nancy Digra, Sandeep Sharma

Share this Article

Downloads: 108

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 242 - 245

An Approach to Detect and Prevent SQL Injection Attacks using Web Service

Shabnam R. Makanadar, Vaibhav V. Solankurkar

Share this Article
Top