Security Issues And Features Of Annotated Bibliography

The authors have expertise with Oracle databases and use examples from the enterprise products this software vendor provides to make their point regarding security of highly distributed networks. One of the more valuable aspects of this specific paper is the focus on how to create a multilevel secure environment in an enterprise. The authors have done enterprise-level database security work in their careers and this article and research communicate their expertise clearly. In the article Data Security: A Security Implementation for Relational Database Management Systems (Nilakanta, 1989) the author contends that information architectures must rely on a stable database management system (DBMS) to scale securely and reliably across an enterprise. The author provides insights into several different security procedures and approaches to defining a secured operating environment for enterprise-wide DBMS implementations and use. There are also guidelines for defining security clearances and recommendations on hwo best to use encryptions for backing up stored, confidential data. The author also contends that given the increasingly easy-to-use interfaces of relational database systems in the enterprise there is a corresponding need for more robust, thorough group- and rules-based applications for better managing this and future generations of databases deliberately designed for widespread adoption and use. The author also provides insights into how the central Database Administrator needs to also define object-based rights and permissions across the entire complex of databases in an enterprise, including the defining of access rights by role, group and workflow that a given employee is involved with.

In the article Multilevel Security Issues in Distributed Database Management Systems II (Thuraisingham, 1991) the author...

...

He further shows how the use of multi-level-based security taxonomy can significantly improve overall performance of heterogeneous databases architectures, incouding those based on the multilevel secure (MLS) model. The author recommends the development and continued fine-tuning of a two-phase commitment protocol that is synchronous in operation, capable of suppoirting a multitier approach to database security model development and role, group and workflow-based security protocol definition. The author provides insights into how time-stamping techniques can also be invaluable in defining how a multilayer-based strategy for managing enterprise security can be used effectively. By combining the MLS-based taxonomies of database design with the DDBMS architectural structures and constraints, the author provides an overview of how to create an effective, scalable multilevel security model for distributed databases in global enterprises.

Sources Used in Documents:

References

Feeney, T.R. (1986). Security issues and features of database management systems. Information Age, 8(3), 155-155.

Fulkerson, C.L., Gonsoulin, M.A., & Walz, D.B. (2002). Database security. Strategic Finance, 84(6), 48-53.

Harris, D., & Sidwell, D. (1994). Distributed database security. Computers & Security, 13(7), 547-547.

Nilakanta, S. (1989). Data security: A security implementation for relational database management systems. Computers & Industrial Engineering, 17(1-4), 415-415.


Cite this Document:

"Security Issues And Features Of" (2012, September 23) Retrieved April 16, 2024, from
https://www.paperdue.com/essay/security-issues-and-features-of-75604

"Security Issues And Features Of" 23 September 2012. Web.16 April. 2024. <
https://www.paperdue.com/essay/security-issues-and-features-of-75604>

"Security Issues And Features Of", 23 September 2012, Accessed.16 April. 2024,
https://www.paperdue.com/essay/security-issues-and-features-of-75604

Related Documents

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

Security Issues for a Database System The biggest questions that any database system must check to ensure the proper operations of the system and the security of data within the system can be understood by following the three guidelines. The first question is to check whether the system administrators themselves are following the guidelines that have been established for the proper operations of the system. The second important question is to

Even though there is always some form of a risk involved in the coding technique together with the deployment methods of a website, some technologies such as PHP and MySQL form some of the worst aggravators of online website security. The loopholes that exists in the use of these technologies results in some of the worst hack attacks and security breaches ever experienced in the field of web design. The

Security Issues in IEEE Wlan
PAGES 20 WORDS 6613

Despite its clear benefits and advantages in terms of ease of use and cost effectiveness, there are certain risks associated with wireless networking. These risks are discussed further below. Review of the Literature. Security Risks Associated with IEEE WLAN 802.11. The applications for wireless communication technology continue to develop and expand; today, at least, the 802.11b is the standard of choice for wireless router communication used with network installation (Gonazles & Higby

Security Study Travel and tourism are major industries in European countries such as Greece. The hotel industry is dedicated to making the accommodations for their patrons as enjoyable as possible. This means ensuring that hotel guests, visitors, and staff have a safe and secure environment. It is for this reason that many of the larger hotel chains have their own private security personnel who are entrusted to maintain the safety of

Transportation Security and Intrusiveness of Security Screenings America's land, seaways, and air transportation systems are structured in such a manner that enhances efficiency and enables easy access, the two features that also at the same time make these transportation systems susceptible to attacks. The expenses and difficulty of protecting the entire transportation systems from attacks raises a critical issue for legislators and other policymakers in the government: in that how much