Verified Document

Database Security Over The Last Article Review

Strengths vs. Weaknesses

The article 2007 Survey on Database Security; highlights the most pressing issues that could be facing an organization (someone from within who could have access to the data). Where, this strength points out a situation that many it managers are overlooking. However, the weakness of the article is that it points out the problem, while at the same time saying there is no effective solution. In many ways this is the equivalent of point out a fire and then not having the tools to put it out. (Ponemon, 2010)

The article How to Secure Sensitive Data in a Cloud Environment; highlights how many businesses are turning to virtual networks to perform many functions. The biggest strengths of the article are: the overall dangers it points with this type of it protocol and how an organization can address these issues. The main weakness of the article is that it only has two solutions. tThis is problematic because businesses need a number of different tools, to adapt to the changing threats that are being encountered on a daily basis. (Markovich, 2010)

The Differences between the Two

The peer reviewed article (2007 Survey on Database Security) is obviously more focused on pointing out issues that could become a problem over the long-term. This is because the issues that are being identified could be just emerging as possible situation, based upon their interviews with it managers....

Therefore, a solution for the problem presented may not be available. The media reviewed article (How to Secure Sensitive Data in a Cloud Environment) highlights current issues that are facing businesses over the short to medium term. Where, the article will identify the problems and will then point out different solutions that can be implemented.
What the two different articles highlight, is that the overall focus on the various it related issues are different, with both showing two critical problems. As a result, the extent of the issues covered will be more in depth in the peer reviewed article, as opposed to the main stream media article. This is because the audience is more technically focused and the content from the peer viewed article, must address issues that are most important to them. Therefore, one can easily see how the accuracy elements are consistent, but the focus of the articles will be geared to reflect the intended audience.

Bibliography

Markovich, S. (2010). How to Secure Sensitive Data in a Cloud Environment. Retrieved May 14, 2010 from E. Week website: http://www.eweek.com/c/a/Cloud-Computing/How-to-Secure-Sensitive-Data-in-Cloud-Environments/

Ponemon, L (2007). 2007 Survey on Database Security. Retrieved May 14, 2010 from Appsec Inc. website: http://www.appsecinc.com/techdocs/whitepapers/2007-Ponemon-Database-Security-Study-Sponsored-by-Application-Security-Inc.pdf

Sources used in this document:
Bibliography

Markovich, S. (2010). How to Secure Sensitive Data in a Cloud Environment. Retrieved May 14, 2010 from E. Week website: http://www.eweek.com/c/a/Cloud-Computing/How-to-Secure-Sensitive-Data-in-Cloud-Environments/

Ponemon, L (2007). 2007 Survey on Database Security. Retrieved May 14, 2010 from Appsec Inc. website: http://www.appsecinc.com/techdocs/whitepapers/2007-Ponemon-Database-Security-Study-Sponsored-by-Application-Security-Inc.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Database Security
Words: 2424 Length: 9 Document Type: Term Paper

Database Security The focus of this study is that of database security. Databases and database technology are such that play critical roles in the use of computers whether it be in business, electronic commerce, engineering, medicine, genetics, law, education or other such entities requiring the use of computer technology. A database is quite simply a collection of data that is related such as a database containing customer information, supplier information, employee

Database Security Plan and Requirements Definition for
Words: 2108 Length: 8 Document Type: Research Paper

Database Security Plan and Requirements Definition for a University Department The database security plan and requirements definition were developed. The plan included, at the outset, the inclusion of major stakeholder at the University and described their roles in initiating, implementing, and maintaining the plan. Individuals responsible for daily and other periodic tasks were developed. A major consideration in planning the security was the policy that governs granting of access. The need-to-know,

Database Security Backup or Recovery
Words: 2090 Length: 7 Document Type: question answer

Part 1: Concurrency Issues in the Database 1. Considering that these various transactions use some of the same tables and fields in the database, explain why it is important for the changes made by each of these transactions to be atomic. (2 pts) Answer: The necessity of an atomic transaction, in this case, is to maintain state consistency in the database system. Since various transactions require the use of the same fields/data

Database Administrator for Department Store
Words: 3901 Length: 13 Document Type: Research Paper

Database Administrator for Department Store Scenario The department store has expanded in the local region by opening five more bookstores, and the bookstore has launched a series of marketing campaign to increase sales and attract new customers. The objective of this technical report is to develop a plan to create and maintain an enterprise-wide database system that will assist the bookstore to hold the inventory and sales data. The database design will

Database Technology Administration Database Technology
Words: 4402 Length: 15 Document Type: Essay

" "STUDENT INFORMATION TABLE" ( "STUDENT ID" CHARACTER (4) NOT NULL, NAME CHARACTER (25) NOT NULL, "STREET NUMBER" CHARACTER (10) NOT NULL, "STREET NAME" CHARACTER (25) NOT NULL, CITY CHARACTER (25) NOT NULL, STATE CHARACTER (10) NOT NULL, EMAIL CHARACTER (25) NOT NULL, "PHONE NUMBER" CHARACTER (15) NOT NULL ); CONNECT RESET; SQL FOR Book_Information CONNECT TO LIBRARY; CREATE TABLE "USER"; CREATE TABLE BookInformation ( "BookISBN" CHARACTER (10) NOT NULL; "AUTHOR" CHARACTER (25) NOT NULL; "TITLE" CHARACTER (50) NOT NULL; "PRICE" CHARACTER (10) NOT NULL; CONNECT RESET; SQL STATEMENT FOR

Database What Is a Database
Words: 1421 Length: 5 Document Type: Term Paper

These factors further accelerate the value and TCO of databases over time. Describe the features, tools, and utilities of Structured Query Language (SQL). How can tasks be automated with SQL? SQL has specifically been designed with features, tools and utilities to enable programmers to support nth-tier data architectures in addition to legacy client-server computing scenarios. The development and continual improvement of the features, tools and utilities of SQL for automating tasks

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now