Verified Document

Database Security Over The Last Article Review

Strengths vs. Weaknesses

The article 2007 Survey on Database Security; highlights the most pressing issues that could be facing an organization (someone from within who could have access to the data). Where, this strength points out a situation that many it managers are overlooking. However, the weakness of the article is that it points out the problem, while at the same time saying there is no effective solution. In many ways this is the equivalent of point out a fire and then not having the tools to put it out. (Ponemon, 2010)

The article How to Secure Sensitive Data in a Cloud Environment; highlights how many businesses are turning to virtual networks to perform many functions. The biggest strengths of the article are: the overall dangers it points with this type of it protocol and how an organization can address these issues. The main weakness of the article is that it only has two solutions. tThis is problematic because businesses need a number of different tools, to adapt to the changing threats that are being encountered on a daily basis. (Markovich, 2010)

The Differences between the Two

The peer reviewed article (2007 Survey on Database Security) is obviously more focused on pointing out issues that could become a problem over the long-term. This is because the issues that are being identified could be just emerging as possible situation, based upon their interviews with it managers....

Therefore, a solution for the problem presented may not be available. The media reviewed article (How to Secure Sensitive Data in a Cloud Environment) highlights current issues that are facing businesses over the short to medium term. Where, the article will identify the problems and will then point out different solutions that can be implemented.
What the two different articles highlight, is that the overall focus on the various it related issues are different, with both showing two critical problems. As a result, the extent of the issues covered will be more in depth in the peer reviewed article, as opposed to the main stream media article. This is because the audience is more technically focused and the content from the peer viewed article, must address issues that are most important to them. Therefore, one can easily see how the accuracy elements are consistent, but the focus of the articles will be geared to reflect the intended audience.

Bibliography

Markovich, S. (2010). How to Secure Sensitive Data in a Cloud Environment. Retrieved May 14, 2010 from E. Week website: http://www.eweek.com/c/a/Cloud-Computing/How-to-Secure-Sensitive-Data-in-Cloud-Environments/

Ponemon, L (2007). 2007 Survey on Database Security. Retrieved May 14, 2010 from Appsec Inc. website: http://www.appsecinc.com/techdocs/whitepapers/2007-Ponemon-Database-Security-Study-Sponsored-by-Application-Security-Inc.pdf

Sources used in this document:
Bibliography

Markovich, S. (2010). How to Secure Sensitive Data in a Cloud Environment. Retrieved May 14, 2010 from E. Week website: http://www.eweek.com/c/a/Cloud-Computing/How-to-Secure-Sensitive-Data-in-Cloud-Environments/

Ponemon, L (2007). 2007 Survey on Database Security. Retrieved May 14, 2010 from Appsec Inc. website: http://www.appsecinc.com/techdocs/whitepapers/2007-Ponemon-Database-Security-Study-Sponsored-by-Application-Security-Inc.pdf
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now