Verified Document

Database Security And SQL Injection Research Proposal

Database Security and SQL Injection

Technology has become an integral part of today's business environment. No business today can operate without an Internet connection or at the very least a company Intranet connecting local computers with each other. While such technology greatly facilitates business operations, it also incurs significant security risks to data. This is why all levels of employers and employees need to be familiar with the appropriate security measures for their particular functions within the business.

A management should be very aware not only of database security generally, but also of particular threats such as SQL injection that could affect the business adversely. This necessity for knowledge should be handled by it researchers that continually update the company's awareness of these possible threats. Such researchers should also work closely with Senior it Management, so that the appropriate security software can be created and installed in order to mitigate threats. Database administrators, designers and users need no comprehensive knowledge of threats, but they do need information on the use and implementation of security software. They should also be made aware of penalties for any attempts to breach such security measures. Database designers and administrators can work concomitantly with it professionals and researchers to implement the security measures necessary to mitigate risks to data.

I have been a database user at my company for a number of years. As such, I am allowed access from only a limited number of locations; one static connection at home, one at work, and one laptop connection that I carry with me when traveling. Each connection has its own password, which is updated on a daily basis. I create the passwords myself, and nobody else has access to these. The it department has provided me with training in optimizing the strength and security of my passwords. Security at my company is extremely important, as data leak could for example lead to a compromise of our competitive edge.

Sources

Chapple, Mike. Database Security: A Fine Balance Between Roles and Rights. About.com http://databases.about.com/od/security/a/databaseroles.htm

Chapple, Mike. SQL Injection Attacks on Databases. About.com. http://databases.about.com/od/security/a/sqlinjection.htm

Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now