Database Security IT4080 Unit 4 (1)
docx
keyboard_arrow_up
School
Capella University *
*We aren’t endorsed by this school
Course
4080
Subject
Information Systems
Date
Jan 9, 2024
Type
docx
Pages
8
Uploaded by CommodorePenguin2708
IT4080
1
Database Security Database Security Capella University - IT4080 Janie Craig
10/30/23
IT4080
2
Database Security When it comes to outsourcing data storage from an organization there are pros and cons that should be taken into account. As one would be at the helm of the vendor they choose for record keeping that may cause issues. Such as if there is a problem within the vendor's
company/ server it may stop Timbuktu Taylors from accessing specific information they may need on hand.
Data in transit can be vulnerable as it can risk ransomware attacks, data theft, as well as eavesdropping attacks. Database servers carry out constraints specified within a database management system. The server will control and manage all clients connected to
it and handle all database access and control requests. A one-to-one or many-to-one relationship can exist between application server domains.
A little information about SQL databases are vertically scalable while NoSQL databases are horizontally scalable. SQL database also known as relational database is a collection of highly structured tables. In each of these tables a data entity is in each column and will define specified information into a field. These databases can create, store, update and can retrieve the data.These are better for multi-row transactions. NoSQL databases are horizontally scalable and these are document, key-value, graph or wide-column stored. NoSQL is better for unstructured data like documents or JSON. NoSQL can assist in getting the big data fast. NoSQL is easy to use, is flexible, and offers
high performance for its users.
IT4080
3
Database Security A risk of NoSQL attacks is an injection attack that can inject malicious code into the application, allowing the attacker to modify the database. NoSQL can be put at risk if it is improperly configured by a new hire or even a seasoned employee that potentially makes a mistake. Improperly configured authentication and authorization can lead to unauthorized access and data breaches. DBMS also known as Database Management System has potential vulnerabilities which is why it would be important for Timbuktu to do research before selecting one and outsourcing. DBMS are software systems used to store, retrieve, and run queries on data. Poor database encryption can make any data on the database vulnerable for attacks. This can compromise customers' information or the company's information as a whole. Not having set access privileges can allow a new hire to access information that is far beyond what they need access too. DoS and DDoS attacks where attackers flood the databases can cause the server to crash and become not accessible to real time users. Buffer overflow can also happen which can lead to too much data input that can lead to attackers
being able to better attack the system. Implementing firewalls, monitoring services, and certain points of access can assist with keeping the organization safe. There are security risks to having any data accessible via the internet, cloud, database, etc. The process of indexing can create a copy on the third-party server as Timbuktu Tuxedo would like to do. This can make searching for data faster but can allow
attackers to have a broader attack surface which can risk the data.Data aggregation can cause a vulnerability such as unauthorized transactions, identity theft, and cyber theft. All
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
IT4080
4
Database Security of the customers data would be stored and security credentials in the same place and this can risk all of it if breached. Polyinstantiation can assist in preventing inference attacks. Which can allow different versions of the same information depending on the level of access.
When it comes to outsourcing data there are pros and cons that should be taken into account. Data in transit can be vulnerable to attacks and poor database encryption can make any data vulnerable to attacks. This can compromise the customers’ information and Timbuktu Tuxedos information. NoSQL can assist in getting the big data
fast but they can risk an injection attack.
IT4080
5
Database Security LAB Photos Activity four
IT4080
6
Database Security
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
IT4080
7
Database Security
IT4080
8
Database Security Sources:
https://www.appdynamics.com/topics/database-management-systems#:~:text=Optimizing
%20database%20performance-,What%20is%20DBMS%3F,delete%20data%20in%20the
%20database
.
“DBMS are software systems used to store, retrieve, and run queries on data.”