Data base security through simulation
This research explores the complexities of database security, encompassing both the computer hardware and software. Also important is its nature as a people oriented issue. A risk analysis of a database system's security can be examined by creating a simulation model. Though, in order for it to...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Published: |
2011
|
Subjects: | |
Online Access: | http://cardinalscholar.bsu.edu/handle/handle/185102 http://liblink.bsu.edu/uhtbin/catkey/902465 |
id |
ndltd-BSU-oai-cardinalscholar.bsu.edu-handle-185102 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-BSU-oai-cardinalscholar.bsu.edu-handle-1851022014-08-05T03:34:05ZData base security through simulationHong, Seng-PhilDatabase security.Risk assessment -- Computer simulation.Computer simulation -- Computer programs.This research explores the complexities of database security, encompassing both the computer hardware and software. Also important is its nature as a people oriented issue. A risk analysis of a database system's security can be examined by creating a simulation model. Though, in order for it to be truly meaningful and accurate, all aspects of design, performance and procedure must be thoroughly and carefully scrutinized.Computer or data security is a major problem in today's world of data processing. This thesis outlines the security problem' and presents trends and issues. It also addresses current trends in computer security environments, database risk analysis, and simulations.Risk analysis is a technique used to quantitatively assess the relative value of protective measures. It is useful when appropriately applied and is in some cases required by regulatory agencies.The goal of security environments is to outline the framework which is valuable in assessing security issues and in establishing partitions in the overall environment within which this and other approaches to security can be examined.A simulation prototype is given which demonstrates the concepts of risk analysis for a database system.Department of Computer ScienceBall State University. Dept. of Computer Science.Fuelling, Clinton P.2011-06-03T19:36:52Z2011-06-03T19:36:52Z19941994vi, 98 leaves ; 28 cm.LD2489.Z78 1994 .H66http://cardinalscholar.bsu.edu/handle/handle/185102http://liblink.bsu.edu/uhtbin/catkey/902465Virtual Press |
collection |
NDLTD |
format |
Others
|
sources |
NDLTD |
topic |
Database security. Risk assessment -- Computer simulation. Computer simulation -- Computer programs. |
spellingShingle |
Database security. Risk assessment -- Computer simulation. Computer simulation -- Computer programs. Hong, Seng-Phil Data base security through simulation |
description |
This research explores the complexities of database security, encompassing both the computer hardware and software. Also important is its nature as a people oriented issue. A risk analysis of a database system's security can be examined by creating a simulation model. Though, in order for it to be truly meaningful and accurate, all aspects of design, performance and procedure must be thoroughly and carefully scrutinized.Computer or data security is a major problem in today's world of data processing. This thesis outlines the security problem' and presents trends and issues. It also addresses current trends in computer security environments, database risk analysis, and simulations.Risk analysis is a technique used to quantitatively assess the relative value of protective measures. It is useful when appropriately applied and is in some cases required by regulatory agencies.The goal of security environments is to outline the framework which is valuable in assessing security issues and in establishing partitions in the overall environment within which this and other approaches to security can be examined.A simulation prototype is given which demonstrates the concepts of risk analysis for a database system. === Department of Computer Science |
author2 |
Ball State University. Dept. of Computer Science. |
author_facet |
Ball State University. Dept. of Computer Science. Hong, Seng-Phil |
author |
Hong, Seng-Phil |
author_sort |
Hong, Seng-Phil |
title |
Data base security through simulation |
title_short |
Data base security through simulation |
title_full |
Data base security through simulation |
title_fullStr |
Data base security through simulation |
title_full_unstemmed |
Data base security through simulation |
title_sort |
data base security through simulation |
publishDate |
2011 |
url |
http://cardinalscholar.bsu.edu/handle/handle/185102 http://liblink.bsu.edu/uhtbin/catkey/902465 |
work_keys_str_mv |
AT hongsengphil databasesecuritythroughsimulation |
_version_ |
1716709889209794560 |