Thursday, January 9, 2020
Annotated Bibliography On Database Encryption - 2297 Words
1. INTRODUCTION Database Encryption is one of the technique used for securing the data in database. This method transforms information on a computer in such a way that it becomes unreadable. So, even if someone is able to gain access to a computer with personal data on it, they likely wonââ¬â¢t be able to do anything with the data unless they have original data key, complicated or expensive software. The main function of encryption is essentially to translate normal text into cipher text. Encryption makes sure that data doesnââ¬â¢t get read by the wrong people, but can also ensure that data isnââ¬â¢t altered in transit, and verify the identity of the sender. Data Encryption method typically uses a specified parameter or key to perform the data transformation. Some encryption algorithms require the key to be the same length as the message to be encoded, yet other encryption algorithms can operate on much smaller keys relative to the message. Encryption is most used among transactions over insecure channels of communication, such as the internet. Encryption is also used to protect data being transferred between devices such as mobile telephones, automatic teller machines (ATMs), and many more. Encryption can be used to create digital signatures, which allow a message to be authenticated. When properly implemented, a digital signature gives the recipient of a message reason to believe the message was sent by the claimed sender. 2. THREATS TO DATABASE 2.1 Database Databases are theShow MoreRelatedManaging Information Security Risks: The Octave Approach1635 Words à |à 6 Pagesand Bonatti discusses security policies as well as the corresponding mechanisms of enforcement. Biskup, J.; Flegel, U.; Karabulut, Y. Secure Mediations: Requirements and Design, 127-140. Database Security XII: Status and Prospects. Edited by S. Jajodia. Twelfth International Working Conference on Database Security, Chalkidiki, Greece, July 15-17, 1998. Norwell, MA: Kluwer Academic Publishers, 1999 (ISBN 0792384881). In this paper, Biskup et al discuses the the secure mediation to it risks throughRead More Networking Report Essay6037 Words à |à 25 Pagesnbsp;nbsp;nbsp;nbsp;nbsp;DIGITAL SUBSCRIBER LINE (DSL) 25.nbsp;nbsp;nbsp;nbsp;nbsp;ACCOUNT SECURITY 26.nbsp;nbsp;nbsp;nbsp;nbsp;CONCLUSION 27.nbsp;nbsp;nbsp;nbsp;nbsp;RECOMMENDATION 28.nbsp;nbsp;nbsp;nbsp;nbsp;BIBLIOGRAPHY 29.nbsp;nbsp;nbsp;nbsp;nbsp;ANNOTATED BIBLIOGRAPHY 30.nbsp;nbsp;nbsp;nbsp;nbsp;APPENDICES APPENDIX 1.1: THE SERVER APPENDIX 1.2: THE NETWORK CARD APPENDIX 1.3: THE ROUTER INTRODUCTION I have decided to research into Networking as myRead MoreEssay Elemica7043 Words à |à 29 Pagesethical issues 17 List of references 18 Annotated Bibliography 20 1. ENVIRONMENTAL ANALYSIS * Company analysis Elemica is the leading provider of supply chain integration and optimization services to the worldââ¬â¢s tire amp; rubber, chemical, energy, and related industries. The company maintains a B2B industry trading hub, a neutral platform that enables companies to link their ERP systems so that information is moved into each companyââ¬â¢s database while maintaining confidentiality and securityRead MoreDatabase Security28570 Words à |à 115 Pages- 1 - Database Security *) GÃÅ"NTHER PERNUL Institut fà ¼r Angewandte Informatik und Informationssysteme Abteilung fà ¼r Information Engineering Università ¤t Wien Vienna, Austria 1. Introduction 1.1 The Relational Data Model Revisited 1.2 The Vocabulary of Security and Major DB Security Threats 2. Database Security Models 2.1 Discretionary Security Models 2.2 Mandatory Security Models 2.3 Adapted Mandatory Access Control Model 2.4 Personal Knowledge Approach 2.5 Clark and Wilson Model 2
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.