Security Of Database Systems Has Become Very Important Now A Days

2765 Words12 Pages
Security of database systems has become very important Now-a-days. As many of the operations now-a-days depend on the database systems, security became a problem because of increase in the number of web applications. If the data is affected in an application, it not only affects that single application but it affects the entire applications present in that system. Data may be damaged not only from the outside damages but may be also from inside damages. Hence, we are using some of the data security techniques like encryption of the data and decryption of the data for keeping the data safe.
Introduction for security of DB:
Security of data mainly concerned with the factors like observation of any of the
…show more content…
So, information control is required for the correct flow of data. For the encryption of the data, we use the cryptographic control.
There are different types of components which provide the data protection in the DBMS. Some such components are access control and semantic correctness. Secrecy of data is maintained by the access control. If a person wants to make changes to the data, then it checks for whether the person trying to change the data is the appropriate user or not by using some of the security points. By these security points we can say that whether the person can use the data or not.
Secrecy of data can also be maintained by the use of some techniques like encryption which is applied to the data when transmitted or when stored. Now the problem is how to change or access the encrypted data. There is a technique called semantic correctness which verifies the semantics of data. If the semantics are correct data can be accessed. The data is stored in the form of symbols. At the end we can recover the data and can make sure whether the data is correct and it is available by using of the recovery system and concurrency control.
Now the research areas are also included in the database security. There are some special techniques involved in the research part which are order preserving and privacy preserving. The applications mainly based on the privacy and the correctness of order.
Layers at organization for security:
To implement the security of database
Get Access