A Review of Database Security Concepts, Risks, and Problems
Keywords:Database Security, Threats, attack, Database vulnerability, protection
Currently, data production is as quick as possible; however, databases are collections of well-organized data that can be accessed, maintained, and updated quickly. Database systems are critical to your company because they convey data about sales transactions, product inventories, customer profiles, and marketing activities. To accomplish data manipulation and maintenance activities the Database Management System considered. Databases differ because their conclusions based on countless rules about what an invulnerable database constitutes. As a result, database protection seekers encounter difficulties in terms of a fantastic figure selection to maintain their database security. The main goal of this study is to identify the risk and how we can secure databases, encrypt sensitive data, modify system databases, and update database systems, as well as to evaluate some of the methods to handle these problems in security databases. However, because information plays such an important role in any organization, understanding the security risk and preventing it from occurring in any database system require a high level of knowledge. As a result, through this paper, all necessary information for any organization has been explained; in addition, also a new technological tool that plays an essential role in database security was discussed.
M. Malik and T. Patel. “Database security attacks and control methods”. International Journal of Information Technology, vol. 6, no. 1/2, pp. 175-183, 2016.
I. Ghafir, J. Saleem, M. Hammoudeh, H. Faour, V. Prenosil, S. Jaf, S. Jabbar and T. Baker. “Security threats to critical infrastructure: The human factor”. The Journal of Supercomputing, vol. 74, no. 10, pp. 4986-5002, 2018.
P. K. Paul and P. S. Aithal. “Database security: An overview and analysis of current trend”. International Journal in Management and Social Science, vol. 4, no. 2, pp. 53-58, 2019.
S. B. Sadkhan. “Related Papers”. Over Rim, pp. 191-199, 2017.
H. Kothari, A. Suwalka and S. Kumar. “Various database attacks, approaches and countermeasures to database security”. International Journal of Advance Research in Computer Science and Management Studies, vol. 5, no. 5, pp. 357-362, 2019.
J. C. Ogbonna, F. O. Nwokoma and A. Ejem. “Database security issues: A review”. International Journal of Engineering Inventions, vol. 6, no. 8, pp. 1812-1816, 2017.
T. Dharmakeerthi. “A Study on Security Concerns and Resolutions”. Researchgate. Net, No. May, 2020.
E. Technology and V. Sharma. “An analytical disparity of harbor tools erection for database system”. International Research Journal of Modernization in Engineering Technology and Science, vol. 3, no. 2, pp. 501-510, 2021.
U. Albalawi. “Countermeasure of Statistical Inference in Database Security”. Proceeding 2018 IEEE International Conference Big Data, Big Data 2018, pp. 2044-2047, 2019.
J. Juma and D. Makupi. “Understanding Database Security Metrics: A Review”. Vol. 1. Mara International Journal of Social Sciences Research Publications, pp. 40-47, 2017.
J. C. Odirichukwu and P. O. Asagba. “Security Concept in Web Database Development and Administration a Review Perspective. 2017 IEEE 3rd International Conference Electro-Technology National Development NIGERCON 2017, vol. 2018-Janua, pp. 383-391, 2018.
A. Mousa, M. Karabatak and T. Mustafa. “Database Security Threats and Challenges”. 8th International Symposium Digital Forensics Secur. ISDFS 2020, vol. 3, no. 5, pp. 810-813, 2020.
S. Singh and R. K. Rai. “A Review Report on Security Threats on Database”. International Journal of Computer Science and Information Technologies, vol. 5, no. 3, pp. 3215-3219, 2014.
H. Tabrizchi and M. K. Rafsanjani. “A Survey on Security Challenges in Cloud Computing: Issues, Threats, and Solutions”. Vol. 76. Springer, United States, 2020.
P. Sharma. “Database Security: Attacks and Techniques”. International Journal of Scientific and Engineering Research, vol. 7, no. 12, pp. 313-319, 2016.
S. S. Sarmah. “Database Security Threats and Prevention”. International Journal of Computer Trends and Technology, vol. 67, no. 5, pp. 46-53, 2019.
T. Mahjabin, Y. Xiao, G. Sun and W. Jiang. “A survey of distributed denial-of-service attack, prevention, and mitigation techniques”. International Journal of Distributed Sensor Networks, vol. 13, no. 12, 2017.
H. B. Hashim. “Challenges and security vulnerabilities to impact on database systems”. Al-Mustansiriyah Journal of Science, vol. 29, no. 2, p. 117, 2018.
W. Lee. “Lecture Notes in Electrical Engineering 461 Proceedings of the 7th International Conference on Emerging Databases”, 2019.
I. Kotsiuba, M. Nesterov, Y. Yanovich, I. Skarga-Bandurova, T. Biloborodova and V. Zhygulin. “Multi-Database Monitoring Tool for the E-Health Services. Proceeding 2018 IEEE International Conference Big Data, Big Data 2018, pp. 2442-2448, 2019.
C. Hamilton and A. Olmstead. “Database Multi-factor Authentication Via Pluggable Authentication Modules”. 2017 12th International Conference Internet Internet Technology and Secured Transactions ICITST 2017, pp. 367-368, 2018.
Copyright (c) 2021 Ramyar Abdulrahman Teimoor
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.