Privacy and Databases

Privacy and Databases 

The Internet provides a wealth of information and services. Many activities in our daily lives now rely on the Internet, including various forms of communication, shopping, financial services, entertainment and many others. As the Internet becomes an increasingly integral part of daily life, questions about privacy and security on the Internet are on the rise. Keeping your personal information, private data and finances safe can be difficult, but by following a few tips, you can avoid the vast majority of scams, spyware and privacy breaches such as choosing strong and varied passwords, verifying website safety. This is necessary as the "Bad guys" can put malware into hosts via Internet, attack servers and network infrastructure, sniff packets, use false source addresses and can do record and playback and what not.

We must make security and privacy ubiquitous, simple, and understood by all. Only then will we be able to preserve one of the greatest innovations of the last century, the Internet, and allow our world to continue to develop, innovate, and prosper.

Security and privacy are crucial in any part of a system, be it software, hardware, front­end/back­end, database, networking or any other component. Data security functions must be integral to all operations in the database management system. On the most fundamental level, that means ensuring only authorized users can access, change, or reproduce the information represented in the system. A database can be split into an arbitrary number of subschemas, each one representing a subset of the total data based on its functional purpose. For example, in an employee database, some users may be able to access salary and benefits information while others may only access performance data.

Now, with distributed databases into picture, where resources, software, and information are shared between multiple devices over a network, security becomes even more important. Despite the benefits offered by cloud­based DBMS, many still have apprehensions about them. This is most likely due to the various security issues that have yet to be dealt with. These security issues stem from the fact that cloud DBMS are hard to monitor since they often span across multiple hardware stacks and servers. Security becomes a serious issue with cloud DBMS when there's multiple Virtual Machines that might be able to access a database without being noticed or setting off any alerts. In this type of situation a malicious person could potentially access pertinent data or cause serious harm to the integral structure of a database, putting the entire system in jeopardy. An obvious solution is the deployment of an autonomous network agent, which rigorously monitor and defends all activities related to database access, provided it is able to handle extremely large and dense volumes of traffic. Alternatively, another solution is to employ continuous database auditing. This involves setting up a system that meticulously records, analyze and report on all activities regarding database access, especially suspicious database access. All information regarding these activities is logged and stored in an extremely remote and secure location with alerts being sent out to cloud management. This will provide those in charge of security with the information necessary to determine who is responsible, where they are located as well as the specifics of their machine / hardware.Furthermore, the identification of errors is probabilistic, rather than deterministic, in nature. DBMS is one of the most commonly used applications, so we need to learn how to work with it effectively.

Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site

More than 18, 378, 87 Solved Course Assignments and Q&A, Easy Download!! Find Now