Verified Document

Database Security And SQL Injection Research Proposal

Database Security and SQL Injection

Technology has become an integral part of today's business environment. No business today can operate without an Internet connection or at the very least a company Intranet connecting local computers with each other. While such technology greatly facilitates business operations, it also incurs significant security risks to data. This is why all levels of employers and employees need to be familiar with the appropriate security measures for their particular functions within the business.

A management should be very aware not only of database security generally, but also of particular threats such as SQL injection that could affect the business adversely. This necessity for knowledge should be handled by it researchers that continually update the company's awareness of these possible threats. Such researchers should also work closely with Senior it Management, so that the appropriate security software can be created and installed in order to mitigate threats. Database administrators, designers and users need no comprehensive knowledge of threats, but they do need information on the use and implementation of security software. They should also be made aware of penalties for any attempts to breach such security measures. Database designers and administrators can work concomitantly with it professionals and researchers to implement the security measures necessary to mitigate risks to data.

I have been a database user at my company for a number of years. As such, I am allowed access from only a limited number of locations; one static connection at home, one at work, and one laptop connection that I carry with me when traveling. Each connection has its own password, which is updated on a daily basis. I create the passwords myself, and nobody else has access to these. The it department has provided me with training in optimizing the strength and security of my passwords. Security at my company is extremely important, as data leak could for example lead to a compromise of our competitive edge.

Sources

Chapple, Mike. Database Security: A Fine Balance Between Roles and Rights. About.com http://databases.about.com/od/security/a/databaseroles.htm

Chapple, Mike. SQL Injection Attacks on Databases. About.com. http://databases.about.com/od/security/a/sqlinjection.htm

Cite this Document:
Copy Bibliography Citation

Related Documents

Database Security
Words: 2424 Length: 9 Document Type: Term Paper

Database Security The focus of this study is that of database security. Databases and database technology are such that play critical roles in the use of computers whether it be in business, electronic commerce, engineering, medicine, genetics, law, education or other such entities requiring the use of computer technology. A database is quite simply a collection of data that is related such as a database containing customer information, supplier information, employee

Database Security Design of an
Words: 2976 Length: 11 Document Type: Term Paper

With optimistic concurrency control, the database checks resources to determine if any conflicts have occurred only when attempting to change data. If a conflict occurs, the application must read the data and attempt the change again. Pessimistic concurrency, on the other hand, control locks resources as they are required, for the duration of a transaction. Unless deadlocks occur, a transaction is assured of successful completion 5.5 Audit Tracking Although auditing does

Database Administrator for Department Store
Words: 3901 Length: 13 Document Type: Research Paper

Database Administrator for Department Store Scenario The department store has expanded in the local region by opening five more bookstores, and the bookstore has launched a series of marketing campaign to increase sales and attract new customers. The objective of this technical report is to develop a plan to create and maintain an enterprise-wide database system that will assist the bookstore to hold the inventory and sales data. The database design will

Database Management Today, Nearly Everyone in Across
Words: 807 Length: 3 Document Type: Capstone Project

Database Management Today, nearly everyone in across the world would love to store their information in the database to keep track of everyday activities. Organizations are also not left behind in operating their businesses by storing their information on databases. Databases are designed in a way they offer organized mechanisms for storage, managing and retrieving information. The data are stored and organized in different tables by the use of Microsoft Excel

Security Auditing Strategy for FX Hospital EHR EMR Website
Words: 2990 Length: 10 Document Type:

Security Audit for FX Hospital EHR/EMR Systems The study carries out the security audits for the FX Hospital EHR/EMR information systems to identify the vulnerabilities in the systems. The study uses the BackTrack as an auditing tool to penetrate the website, and outcomes of the auditing reveal that the website is not secure and can be subject to different vulnerabilities. After carrying out the auditing, the study is able to collect

Security Issues Creating a Site
Words: 4754 Length: 17 Document Type: Research Proposal

Even though there is always some form of a risk involved in the coding technique together with the deployment methods of a website, some technologies such as PHP and MySQL form some of the worst aggravators of online website security. The loopholes that exists in the use of these technologies results in some of the worst hack attacks and security breaches ever experienced in the field of web design. The

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now