In twelve pages this paper examines database protection and the problem of back door usage in this consideration of Internet security issues and possible solutions. Six sources are cited in the bibliography.
Name of Research Paper File: RT13_SA129sec.rtf
Unformatted Sample Text from the Research Paper:
up solely based on their ability to thrive in an online environment. While the net has been good to most businesses, every company faces greater security risks as a result.
With so much data available at the click of a mouse, there are real threats and concerns that were not previously present. The integrity of the company database is of
course of the utmost concern. Some companies have endured public relations and logistical nightmares after hackers were able to breach security. Thus, the
security of the database should be high in terms of priority for any company, whether or not the Internet supports their main type of transactions. Databases can be compromised from
within company walls too. It is important to note that a secure database must meet additional standards in terms of availability, integrity
and confidentiality (Spalka and Cremers 67). A secure database is generally thought to be an extension to an open database and should be representative of an image for a secure
real-world section (67). Confidentiality demands will inevitably crop up in many situations and while some are dictated by the law, others are
simply company preference (Spalka and Cremers 67). Thus, in evaluating the need for security in databases, many issues will be broached. What type of company is it that needs protection?
Is the data sensitive? For example, might data contain personal, guarded information such as the medical records of a celebrity, or is the data more general, where no serious consequences
will arise if the information is leaked? When designing types of security for databases, the extent and expense a firm goes to does