Database Privacy and Security from Inference Attack

2011 
For any company, the major issue that it needs to address and focus on is to ensure the safety of databases. Complexity of security measures increases with the complexity of databases. Security problems increase with the addition of more users. This is aimed at shedding light on the main methods of attack on a database, and ways to overcome it by highlighting on data interference. Valuable information stored in its computer system database is the most precious assets of the company that must be protected. Safety issues govern the database from the conception point to its application. Modern approaches employed to assure the security of databases address security and protection defenses at all levels: physical, network, host, applications and data. The first of such measures has to be applied starting at the physical level and to then progress right through, reaching the data level at the other end. Majorly due to primitive and rudimentary nature of earlier attacks, as well as the simple nature and construction of the then prevalent networks with very limited complexity if any, companies have had a rather simplistic approach and did therefore focus on assuring security at the physical level. It used to involve basic measures such as limiting access to locations that only authorized personnel may have access to data. But in this genera, due to the rapidly changing and increased size as well as complexity and expansion of company information systems, AAA type measures began to be used (Authentication, Authorisation, Access). Today, security measures are far more complex. These are meant to stop the highly sophisticated attacks from external attackers, and especially, from those who may very well have access to the company’s internal network.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    5
    References
    0
    Citations
    NaN
    KQI
    []