IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 7 - Issue 1, January 2017 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Security Of An Enterprise Level Rdbms - Threats And Challenges

[Full Text]

 

AUTHOR(S)

Ch Sajjad Ahmed, Saeed ur Rehman Malik

 

KEYWORDS

RDBMS, Database security, challenges, threats, attacks

 

ABSTRACT

All enterprises are managing their day to day affairs using IT based applications. In these applications, the most valuable asset is Data. A Relational Database Management System is utilized to retrieve and maintain the data in an efficient manner. (RDBMS)[1] was coined in Late-Seventies by E.F. Codd and since then all commercial and enterprise database are following RDBMS Model. Importance of data and its volume make RDBMS favorite targets for attackers. These attacks can result in compromise of a Database in many ways. In this paper the challenges and threats being faced by RDBMS are identified

 

REFERENCES

[1] C.F Codd, “ A RELATIONAL MODEL OF DATA FOR LARGE SHARED DATA BANK”, Communication of ACM, Vol 13, No 6, 1970, Pages 377-87

[2] http://www.brighthub.com/computing/smb-security/articles/61400.aspx (20 Nov 2014)

[3] ErezShmueli, Ronen Vaisenberg, Yuval Elovici, ChananGlezer, “Database Encryption – AN OVERVIEW OF CONTEMPORARY CHALLENGES AND DESIGN CONSIDERATIONS”, SIGMOD Record, September 2009 (Vol. 38, No. 3).

[4] Emil Burtescu, “DATABASE SECURITY - ATTACKS AND CONTROL METHODS”, Journal of Applied Quantitative Methods, Vol. 4, no. 4, Winter 2009.

[5] Mr. SaurabhKulkarni, Dr. SiddhalingUrolagin, “REVIEW OF ATTACKS ON DATABASES AND DATABASE SECURITY TECHNIQUES”, International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, Volume 2, Issue 11, November 2012

[6] Amichai Shulman, White Paper “TOP TEN DATABASE SECURITY THREATS”, ImpervaInc

[7] http://www.channelinsider.com/c/a/Security/Database-Vulnerabilities-Top-10-Rules-IT-Shops-Break-772412 (18 Nov 2014)

[8] Ravi S. Sandhu, SushilJajodia, “DATA AND DATABASE SECURITY AND CONTROLS”, Handbook of Information Security Management, Auerbach Publishers, 1993, pages 481-499.

[9] http://www.w3schools.com/sql/sql_injection.asp (18 Nov 2014)