Data Security

Read Complete Research Material

Data Security

Data Security

table of contents

1ABSTRACT3

2INTRODUCTION4

3DISCUSSION5

3.1 Data independence 5

3.1 Data security5

3.2 Data integrity6

3.3 Concurrency Control6

3.4 Recovery7

3.5 SQL server database security policies7

3.6 SQL Server Security Configuration7

3.6.1 Use a secure password policy7

3.6.2 Account of the use of safety strategies8

3.6.3 Strengthen the database log records9

3.6.4 Management extended stored procedure9

3.6.5 Use protocol encryption10

3.6.6 Do not let casual detection to your TCP / IP port10

3.6.7 Used to modify the TCP / IP port10

3.6.8 Refuse from the 1434 port probe11

3.6.9 IP restrictions on the network connection11

3.6.10 Other issues in data security management11

4 CONCLUSION13

5 REFERENCES14

Abstract

In this document we will discuss the basic concept of data security in computer database and the basic information regarding the database security. Before that we will specifically discuss the reason behind the securing the database. Then we will briefly discuss the Microsoft SQL Server 2000. Here we will discuss the secure password policy, account of the use of safety strategies, management extended stored procedure, do not let casual detection to your TCP / IP port, used to modify the TCP / IP port, Refuse from the 1434 port probe and IP restrictions on the network connection. There are some more issues in data management security option that we will discuss ahead. At the end we will conclude the topic in the light of the issues and solution discussed in the whole paper.

Introduction

We need to secure our data from sniffing and spoofing as we cannot afford to lose it. We have to do all what it takes to secure our database and files. These files can be sniffed or corrupted by any of our enemies or any blackmailer who wants to earn money with that. We need to make the security at the level best extent to make our data safety possible. There are many options i.e. antivirus encryption and so on, but we need to have something more suitable than these options.

Database Security contains two meanings: the first layer is the system is running security system safe operation of the usual threats are as follows, network criminals through a network, LAN, and other ways through the invasion of the computer system does not start properly, or overload the machine running a large number of algorithms, and turn off the CPU fan, CPU overheating burn and other destructive activities.

The second layer is the information systems security, system security is usually the threats are as follows hacker intrusion on the database, and steal the information you want. Database system security features for data, including data independence, data security, data integrity, concurrency control, fault recovery. Management system is responsible to avoid concurrent access to the database. This registration also contains information relevant to the recovery of the database, if a failure thereof or a system crash. Although this mechanism does not prevent unauthorized access, is a deterrent to potential attackers, allowing also found weaknesses in security mechanisms. In addition to all these mechanisms, the physical medium that is stored on the database may be protected cryptographically. Also backups can these well defended against ...
Related Ads