Database Security: Attacks and Solutions

0Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Data is a critical merit resource and due to its importance, data protection is a noteworthy component of database security. Database security refer to the measures and tools used to protect a database from unauthorized laws, spiteful threats and attacks. Data security means protecting data, alike in a database, from malicious and devastating forces of unauthorized and unauthenticated users, such as cybercrime attacks or a data security breach. Since digitalization and rapid progress in technology, web applications and databases are widely used like e-commerce, online payments, online banking, money transfer, social networking, etc. [15]. For seamless and hustle-free experience which includes risk free operations on databases, defining and implementing database security is utmost important. Security aims that would be applied for data security, includes: CIA triad; Confidentiality for concealment of data and issues of privileges abuse, Integrity for trustworthiness of data and issues of legitimate unauthorized accesses including social engineering attacks. Availability guarantees that resources are available to users when they need them and issues are exposure of backup data and denial of service. It acknowledges the economic, financial and commercial documentation of records and reports related to an organization [11]. Moreover, security attacks, solutions, comparison table and future work are discussed in this paper.

Cite

CITATION STYLE

APA

Soni, S., & Mathew, R. (2020). Database Security: Attacks and Solutions. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 49, pp. 917–925). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-43192-1_100

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free