Abstract
In today's world, information security of an organization has become a major challenge as well as a critical business issue. Managing and mitigating these internal or external security related issues, organizations hire highly knowledgeable security expert persons. Insider threats in database management system (DBMS) are inherently a very hard problem to address. Employees within the organization carry out or harm organization data in a professional manner. To protect and monitor organization information from insider user in DBMS, the organization used different techniques, but these techniques are insufficient to secure their data. We offer an autonomous approach to self-protection architecture based on policy implementation in DBMS. This research proposes an autonomic model for protection that will enforce Access Control policies, Database Auditing policies, Encryption policies, user authentication policies, and database configuration setting policies in DBMS. The purpose of these policies to restrict insider user or Database Administrator (DBA) from malicious activities to protect data.
Cite
CITATION STYLE
Zaman, F., Raza, B., Kamran, A., & Anjum, A. (2017). Self-Protection against Insider Threats in DBMS through Policies Implementation. International Journal of Advanced Computer Science and Applications, 8(3). https://doi.org/10.14569/ijacsa.2017.080334
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.