• Research Paper on:
    Database Protection

    Number of Pages: 12

     

    Summary of the research paper:

    In twelve pages this paper examines database protection and the problem of back door usage in this consideration of Internet security issues and possible solutions. Six sources are cited in the bibliography.

    Name of Research Paper File: RT13_SA129sec.rtf

    Buy This Research Paper »

     

    Unformatted Sample Text from the Research Paper:
    up solely based on their ability to thrive in an online environment. While the net has been good to most businesses, every company faces greater security risks as a result.  With so much data available at the click of a mouse, there are real threats and concerns that were not previously present. The integrity of the company database is of  course of the utmost concern. Some companies have endured public relations and logistical nightmares after hackers were able to breach security. Thus, the  security of the database should be high in terms of priority for any company, whether or not the Internet supports their main type of transactions. Databases can be compromised from  within company walls too. It is important to note that a secure database must meet additional standards in terms of availability, integrity  and confidentiality (Spalka and Cremers 67). A secure database is generally thought to be an extension to an open database and should be representative of an image for a secure  real-world section (67). Confidentiality demands will inevitably crop up in many situations and while some are dictated by the law, others are  simply company preference (Spalka and Cremers 67). Thus, in evaluating the need for security in databases, many issues will be broached. What type of company is it that needs protection?  Is the data sensitive? For example, might data contain personal, guarded information such as the medical records of a celebrity, or is the data more general, where no serious consequences  will arise if the information is leaked? When designing types of security for databases, the extent and expense a firm goes to does 

    Back to Research Paper Results