Database Security Over The Last Article Review

PAGES
2
WORDS
904
Cite

Strengths vs. Weaknesses

The article 2007 Survey on Database Security; highlights the most pressing issues that could be facing an organization (someone from within who could have access to the data). Where, this strength points out a situation that many it managers are overlooking. However, the weakness of the article is that it points out the problem, while at the same time saying there is no effective solution. In many ways this is the equivalent of point out a fire and then not having the tools to put it out. (Ponemon, 2010)

The article How to Secure Sensitive Data in a Cloud Environment; highlights how many businesses are turning to virtual networks to perform many functions. The biggest strengths of the article are: the overall dangers it points with this type of it protocol and how an organization can address these issues. The main weakness of the article is that it only has two solutions. tThis is problematic because businesses need a number of different tools, to adapt to the changing threats that are being encountered on a daily basis. (Markovich, 2010)

The Differences between the Two

The peer reviewed article (2007 Survey on Database Security) is obviously more focused on pointing out issues that could become a problem over the long-term. This is because the issues that are being identified could be just emerging as possible situation, based upon their interviews with it managers....

...

Therefore, a solution for the problem presented may not be available. The media reviewed article (How to Secure Sensitive Data in a Cloud Environment) highlights current issues that are facing businesses over the short to medium term. Where, the article will identify the problems and will then point out different solutions that can be implemented.
What the two different articles highlight, is that the overall focus on the various it related issues are different, with both showing two critical problems. As a result, the extent of the issues covered will be more in depth in the peer reviewed article, as opposed to the main stream media article. This is because the audience is more technically focused and the content from the peer viewed article, must address issues that are most important to them. Therefore, one can easily see how the accuracy elements are consistent, but the focus of the articles will be geared to reflect the intended audience.

Bibliography

Markovich, S. (2010). How to Secure Sensitive Data in a Cloud Environment. Retrieved May 14, 2010 from E. Week website: http://www.eweek.com/c/a/Cloud-Computing/How-to-Secure-Sensitive-Data-in-Cloud-Environments/

Ponemon, L (2007). 2007 Survey on Database Security. Retrieved May 14, 2010 from Appsec Inc. website: http://www.appsecinc.com/techdocs/whitepapers/2007-Ponemon-Database-Security-Study-Sponsored-by-Application-Security-Inc.pdf

Sources Used in Documents:

Bibliography

Markovich, S. (2010). How to Secure Sensitive Data in a Cloud Environment. Retrieved May 14, 2010 from E. Week website: http://www.eweek.com/c/a/Cloud-Computing/How-to-Secure-Sensitive-Data-in-Cloud-Environments/

Ponemon, L (2007). 2007 Survey on Database Security. Retrieved May 14, 2010 from Appsec Inc. website: http://www.appsecinc.com/techdocs/whitepapers/2007-Ponemon-Database-Security-Study-Sponsored-by-Application-Security-Inc.pdf


Cite this Document:

"Database Security Over The Last" (2010, May 14) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/database-security-over-the-last-12750

"Database Security Over The Last" 14 May 2010. Web.25 April. 2024. <
https://www.paperdue.com/essay/database-security-over-the-last-12750>

"Database Security Over The Last", 14 May 2010, Accessed.25 April. 2024,
https://www.paperdue.com/essay/database-security-over-the-last-12750

Related Documents
Database Security
PAGES 9 WORDS 2424

Database Security The focus of this study is that of database security. Databases and database technology are such that play critical roles in the use of computers whether it be in business, electronic commerce, engineering, medicine, genetics, law, education or other such entities requiring the use of computer technology. A database is quite simply a collection of data that is related such as a database containing customer information, supplier information, employee

Database Security Plan and Requirements Definition for a University Department The database security plan and requirements definition were developed. The plan included, at the outset, the inclusion of major stakeholder at the University and described their roles in initiating, implementing, and maintaining the plan. Individuals responsible for daily and other periodic tasks were developed. A major consideration in planning the security was the policy that governs granting of access. The need-to-know,

Databases and Regulatory Compliance Challenges The advent of technology has increased the popularity of database usage in firms, yet the legislation regulating the field has yet to be finalized. The changing nature of the IT sector, coupled with the legislative traits, creates several situations in which the companies find it difficult to comply with the regulations. This paper recognizes some of those difficulties, and also proposes some solutions. Databases Regulatory challenges for databases No

Databases in the Work Place We are in the information age and the effective management of data is paramount in almost all aspects of our life. All businesses today thrive on the availability of vast pool of data pertaining to their domain and thus databases constitute an indispensable aspect of all businesses. Having access to a huge database and the intelligent interpretation of the data therein holds the key to business

Part 1: Concurrency Issues in the Database 1. Considering that these various transactions use some of the same tables and fields in the database, explain why it is important for the changes made by each of these transactions to be atomic. (2 pts) Answer: The necessity of an atomic transaction, in this case, is to maintain state consistency in the database system. Since various transactions require the use of the same fields/data

Database Administrator for Department Store Scenario The department store has expanded in the local region by opening five more bookstores, and the bookstore has launched a series of marketing campaign to increase sales and attract new customers. The objective of this technical report is to develop a plan to create and maintain an enterprise-wide database system that will assist the bookstore to hold the inventory and sales data. The database design will