Data base security through simulation

This research explores the complexities of database security, encompassing both the computer hardware and software. Also important is its nature as a people oriented issue. A risk analysis of a database system's security can be examined by creating a simulation model. Though, in order for it to...

Full description

Bibliographic Details
Main Author: Hong, Seng-Phil
Other Authors: Ball State University. Dept. of Computer Science.
Format: Others
Published: 2011
Subjects:
Online Access:http://cardinalscholar.bsu.edu/handle/handle/185102
http://liblink.bsu.edu/uhtbin/catkey/902465
id ndltd-BSU-oai-cardinalscholar.bsu.edu-handle-185102
record_format oai_dc
spelling ndltd-BSU-oai-cardinalscholar.bsu.edu-handle-1851022014-08-05T03:34:05ZData base security through simulationHong, Seng-PhilDatabase security.Risk assessment -- Computer simulation.Computer simulation -- Computer programs.This research explores the complexities of database security, encompassing both the computer hardware and software. Also important is its nature as a people oriented issue. A risk analysis of a database system's security can be examined by creating a simulation model. Though, in order for it to be truly meaningful and accurate, all aspects of design, performance and procedure must be thoroughly and carefully scrutinized.Computer or data security is a major problem in today's world of data processing. This thesis outlines the security problem' and presents trends and issues. It also addresses current trends in computer security environments, database risk analysis, and simulations.Risk analysis is a technique used to quantitatively assess the relative value of protective measures. It is useful when appropriately applied and is in some cases required by regulatory agencies.The goal of security environments is to outline the framework which is valuable in assessing security issues and in establishing partitions in the overall environment within which this and other approaches to security can be examined.A simulation prototype is given which demonstrates the concepts of risk analysis for a database system.Department of Computer ScienceBall State University. Dept. of Computer Science.Fuelling, Clinton P.2011-06-03T19:36:52Z2011-06-03T19:36:52Z19941994vi, 98 leaves ; 28 cm.LD2489.Z78 1994 .H66http://cardinalscholar.bsu.edu/handle/handle/185102http://liblink.bsu.edu/uhtbin/catkey/902465Virtual Press
collection NDLTD
format Others
sources NDLTD
topic Database security.
Risk assessment -- Computer simulation.
Computer simulation -- Computer programs.
spellingShingle Database security.
Risk assessment -- Computer simulation.
Computer simulation -- Computer programs.
Hong, Seng-Phil
Data base security through simulation
description This research explores the complexities of database security, encompassing both the computer hardware and software. Also important is its nature as a people oriented issue. A risk analysis of a database system's security can be examined by creating a simulation model. Though, in order for it to be truly meaningful and accurate, all aspects of design, performance and procedure must be thoroughly and carefully scrutinized.Computer or data security is a major problem in today's world of data processing. This thesis outlines the security problem' and presents trends and issues. It also addresses current trends in computer security environments, database risk analysis, and simulations.Risk analysis is a technique used to quantitatively assess the relative value of protective measures. It is useful when appropriately applied and is in some cases required by regulatory agencies.The goal of security environments is to outline the framework which is valuable in assessing security issues and in establishing partitions in the overall environment within which this and other approaches to security can be examined.A simulation prototype is given which demonstrates the concepts of risk analysis for a database system. === Department of Computer Science
author2 Ball State University. Dept. of Computer Science.
author_facet Ball State University. Dept. of Computer Science.
Hong, Seng-Phil
author Hong, Seng-Phil
author_sort Hong, Seng-Phil
title Data base security through simulation
title_short Data base security through simulation
title_full Data base security through simulation
title_fullStr Data base security through simulation
title_full_unstemmed Data base security through simulation
title_sort data base security through simulation
publishDate 2011
url http://cardinalscholar.bsu.edu/handle/handle/185102
http://liblink.bsu.edu/uhtbin/catkey/902465
work_keys_str_mv AT hongsengphil databasesecuritythroughsimulation
_version_ 1716709889209794560