Database Security Is Responsible Protecting The Confidentiality, Integrity And Availability

1577 WordsSep 22, 20157 Pages
DATABASE SECURITY University Student Executive Overview This report looks into database security then compares database security tools that can be adopted and implemented to solve database threats. The conclusions and recommendations made can enable an organization choose an effective and efficient security tool to be in order to attain utmost security of data, resources and information. The research was conducted by accessing information from the internet, reading various books and articles. This research notably conveyed a paradigm shift in database security threats due to their sophistication and increase, hence increased need for implementation of watertight security solutions. Database security is responsible protecting the “Confidentiality, Integrity and Availability”, CIA of a database. A database is composed of network links, data, database programs and database servers (Basta, Zgola & Bullaboy 2013). With this knowledge of what a database is and how critical its contents are, then it is paramount that any organization implements appropriate security tools after careful consideration of the pros and cons of each. This report is thus aimed at advising and recommending best suited solution for any enterprise to use in protecting their databases. A detailed comparison made by the report shows differences of three chosen security tools then recommends the security tool that is cost-effective and easy to use and configure. Database Security Introduction
Open Document