Matches in DBpedia 2015-10 for { <http://dbpedia.org/resource/Database_security> ?p ?o }
Showing triples 1 to 73 of
73
with 100 triples per page.
- Database_security abstract "Database security concerns the use of a broad range of information security controls to protect databases (potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated network links) against compromises of their confidentiality, integrity and availability. It involves various types or categories of controls, such as technical, procedural/administrative and physical. Database security is a specialist topic within the broader realms of computer security, information security and risk management. Security risks to database systems include, for example: Unauthorized or unintended activity or misuse by authorized database users, database administrators, or network/systems managers, or by unauthorized users or hackers (e.g. inappropriate access to sensitive data, metadata or functions within databases, or inappropriate changes to the database programs, structures or security configurations); Malware infections causing incidents such as unauthorized access, leakage or disclosure of personal or proprietary data, deletion of or damage to the data or programs, interruption or denial of authorized access to the database, attacks on other systems and the unanticipated failure of database services; Overloads, performance constraints and capacity issues resulting in the inability of authorized users to use databases as intended; Physical damage to database servers caused by computer room fires or floods, overheating, lightning, accidental liquid spills, static discharge, electronic breakdowns/equipment failures and obsolescence; Design flaws and programming bugs in databases and the associated programs and systems, creating various security vulnerabilities (e.g. unauthorized privilege escalation), data loss/corruption, performance degradation etc.; Data corruption and/or loss caused by the entry of invalid data or commands, mistakes in database or system administration processes, sabotage/criminal damage etc.Ross J. Anderson has often said that by their nature large databases will never be free of abuse by breaches of security; if a large system is designed for ease of access it becomes insecure; if made watertight it becomes impossible to use. This is sometimes known as Anderson's Rule.Many layers and types of information security control are appropriate to databases, including:Access controlAuditingAuthenticationEncryptionIntegrity controlsBackupsApplication securityDatabase Security applying Statistical Method Databases have been largely secured against hackers through network security measures such as firewalls, and network-based intrusion detection systems. While network security controls remain valuable in this regard, securing the database systems themselves, and the programs/functions and data within them, has arguably become more critical as networks are increasingly opened to wider access, in particular access from the Internet. Furthermore, system, program, function and data access controls, along with the associated user identification, authentication and rights management functions, have always been important to limit and in some cases log the activities of authorized users and administrators. In other words, these are complementary approaches to database security, working from both the outside-in and the inside-out as it were.Many organizations develop their own "baseline" security standards and designs detailing basic security control measures for their database systems. These may reflect general information security requirements or obligations imposed by corporate information security policies and applicable laws and regulations (e.g. concerning privacy, financial management and reporting systems), along with generally accepted good database security practices (such as appropriate hardening of the underlying systems) and perhaps security recommendations from the relevant database system and software vendors. The security designs for specific database systems typically specify further security administration and management functions (such as administration and reporting of user access rights, log management and analysis, database replication/synchronization and backups) along with various business-driven information security controls within the database programs and functions (e.g. data entry validation and audit trails). Furthermore, various security-related activities (manual controls) are normally incorporated into the procedures, guidelines etc. relating to the design, development, configuration, use, management and maintenance of databases.".
- Database_security wikiPageExternalLink index.html.
- Database_security wikiPageExternalLink index.html.
- Database_security wikiPageExternalLink showArticle.jhtml?articleID=208803797.
- Database_security wikiPageExternalLink database-stig-v7r1.pdf.
- Database_security wikiPageID "4689778".
- Database_security wikiPageLength "13285".
- Database_security wikiPageOutDegree "40".
- Database_security wikiPageRevisionID "642111776".
- Database_security wikiPageWikiLink Access_control.
- Database_security wikiPageWikiLink Application_firewall.
- Database_security wikiPageWikiLink Application_security.
- Database_security wikiPageWikiLink Application_server.
- Database_security wikiPageWikiLink Application_software.
- Database_security wikiPageWikiLink Audit_trail.
- Database_security wikiPageWikiLink Authentication.
- Database_security wikiPageWikiLink Authorization.
- Database_security wikiPageWikiLink Authorization_(computer_access_control).
- Database_security wikiPageWikiLink Backup.
- Database_security wikiPageWikiLink Backups.
- Database_security wikiPageWikiLink Category:Database_security.
- Database_security wikiPageWikiLink Computer_security.
- Database_security wikiPageWikiLink Data_integrity.
- Database_security wikiPageWikiLink Database.
- Database_security wikiPageWikiLink Database_Security_applying_Statistical_Method.
- Database_security wikiPageWikiLink Database_activity_monitoring.
- Database_security wikiPageWikiLink Database_administrator.
- Database_security wikiPageWikiLink Database_audit.
- Database_security wikiPageWikiLink Database_firewall.
- Database_security wikiPageWikiLink Database_forensics.
- Database_security wikiPageWikiLink Disaster_recovery.
- Database_security wikiPageWikiLink Encryption.
- Database_security wikiPageWikiLink FIPS_140-2.
- Database_security wikiPageWikiLink Firewall_(computing).
- Database_security wikiPageWikiLink Firewall_(networking).
- Database_security wikiPageWikiLink Information_security.
- Database_security wikiPageWikiLink Intrusion_detection.
- Database_security wikiPageWikiLink Intrusion_detection_system.
- Database_security wikiPageWikiLink Negative_database.
- Database_security wikiPageWikiLink Network_security.
- Database_security wikiPageWikiLink Patch_(computing).
- Database_security wikiPageWikiLink Privilege_escalation.
- Database_security wikiPageWikiLink Replication_(computer_science).
- Database_security wikiPageWikiLink Replication_(computing).
- Database_security wikiPageWikiLink Risk_management.
- Database_security wikiPageWikiLink Ross_J._Anderson.
- Database_security wikiPageWikiLink SQL.
- Database_security wikiPageWikiLink Single_sign-on.
- Database_security wikiPageWikiLink Table_(database).
- Database_security wikiPageWikiLink Two-factor_authentication.
- Database_security wikiPageWikiLink Virtual_private_database.
- Database_security wikiPageWikiLink Vulnerability_(computing).
- Database_security wikiPageWikiLinkText "Database Security".
- Database_security wikiPageWikiLinkText "Database security".
- Database_security wikiPageWikiLinkText "Security".
- Database_security wikiPageWikiLinkText "database security".
- Database_security hasPhotoCollection Database_security.
- Database_security wikiPageUsesTemplate Template:Database.
- Database_security wikiPageUsesTemplate Template:Details.
- Database_security wikiPageUsesTemplate Template:Essay.
- Database_security wikiPageUsesTemplate Template:Refimprove.
- Database_security subject Category:Database_security.
- Database_security comment "Database security concerns the use of a broad range of information security controls to protect databases (potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated network links) against compromises of their confidentiality, integrity and availability. It involves various types or categories of controls, such as technical, procedural/administrative and physical.".
- Database_security label "Database security".
- Database_security sameAs Datenbanksicherheit.
- Database_security sameAs امنیت_پایگاه_داده.
- Database_security sameAs Protezione_del_database.
- Database_security sameAs 데이터베이스_보안.
- Database_security sameAs m.0chh2c.
- Database_security sameAs Q1035293.
- Database_security sameAs Q1035293.
- Database_security wasDerivedFrom Database_security?oldid=642111776.
- Database_security isPrimaryTopicOf Database_security.