Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal

<p class="JDFSLParagraph">Database security has evolved; data security professionals have developed numerous techniques and approaches to assure data confidentiality, integrity, and availability. This paper will show that the Traditional Database Security, which has focused primarily...

Full description

Bibliographic Details
Main Author: Errol A. Blake
Format: Article
Language:English
Published: Association of Digital Forensics, Security and Law 2007-12-01
Series:Journal of Digital Forensics, Security and Law
Online Access:http://ojs.jdfsl.org/index.php/jdfsl/article/view/191
id doaj-70bb8b65549a439c8ad6fbb06f1248f2
record_format Article
spelling doaj-70bb8b65549a439c8ad6fbb06f1248f22020-11-25T01:10:11ZengAssociation of Digital Forensics, Security and LawJournal of Digital Forensics, Security and Law1558-72151558-72232007-12-012477106114Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and GoalErrol A. Blake<p class="JDFSLParagraph">Database security has evolved; data security professionals have developed numerous techniques and approaches to assure data confidentiality, integrity, and availability. This paper will show that the Traditional Database Security, which has focused primarily on creating user accounts and managing user privileges to database objects are not enough to protect data confidentiality, integrity, and availability. This paper is a compilation of different journals, articles and classroom discussions will focus on unifying the process of securing data or information whether it is in use, in storage or being transmitted. Promoting a change in Database Curriculum Development trends may also play a role in helping secure databases. This paper will take the approach that if one make a conscientious effort to unifying the Database Security process, which includes Database Management System (DBMS) selection process, following regulatory compliances, analyzing and learning from the mistakes of others, Implementing Networking Security Technologies, and Securing the Database, may prevent database breach.</p>http://ojs.jdfsl.org/index.php/jdfsl/article/view/191
collection DOAJ
language English
format Article
sources DOAJ
author Errol A. Blake
spellingShingle Errol A. Blake
Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal
Journal of Digital Forensics, Security and Law
author_facet Errol A. Blake
author_sort Errol A. Blake
title Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal
title_short Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal
title_full Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal
title_fullStr Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal
title_full_unstemmed Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal
title_sort network and database security: regulatory compliance, network, and database security - a unified process and goal
publisher Association of Digital Forensics, Security and Law
series Journal of Digital Forensics, Security and Law
issn 1558-7215
1558-7223
publishDate 2007-12-01
description <p class="JDFSLParagraph">Database security has evolved; data security professionals have developed numerous techniques and approaches to assure data confidentiality, integrity, and availability. This paper will show that the Traditional Database Security, which has focused primarily on creating user accounts and managing user privileges to database objects are not enough to protect data confidentiality, integrity, and availability. This paper is a compilation of different journals, articles and classroom discussions will focus on unifying the process of securing data or information whether it is in use, in storage or being transmitted. Promoting a change in Database Curriculum Development trends may also play a role in helping secure databases. This paper will take the approach that if one make a conscientious effort to unifying the Database Security process, which includes Database Management System (DBMS) selection process, following regulatory compliances, analyzing and learning from the mistakes of others, Implementing Networking Security Technologies, and Securing the Database, may prevent database breach.</p>
url http://ojs.jdfsl.org/index.php/jdfsl/article/view/191
work_keys_str_mv AT errolablake networkanddatabasesecurityregulatorycompliancenetworkanddatabasesecurityaunifiedprocessandgoal
_version_ 1725176287616565248