DATA BASE SECURITY TECHNOLOGIES THAT HELP PROTECT AGAINST MISUSE BY EXTERNAL HACKERS RELATED RESEARCH ARTICLES

Main Article Content

CARMEN ELENA MANTILLA CABRERA, RUTH BARBA-VERA, LIGIA MARICELA NIAMA RIVERA, MARIA LORENA VILLACRÉS PUMAGUALLI

Abstract

The paper bases on security gives which can be associated with the information base gadget which are mechanically employed by means of different relationship in their physical exercises. Realities bases are fundamental to changed business endeavor and specialists seeking, to frame the recuperation and support of ability dependable and proficient it's cared for in an enlightening assortment. Realities base connection and substance are noticeable as large organization property that must be fastidiously guaranteed considering the way that records bases are a most cherished objective for aggressors. The fundamental wellbeing necessities of understanding base structure resemble those of various enrolling framework. Assurance, guarantee and validity of data are referenced in each movement accomplished on net. Records are taken care of in measurements base for honest and successful approach to influence control those insights. Considering the criticalness of comprehension in affiliation, it's huge to ensure roughly the information blessing in the records base. A guaranteed records base is that the one that is responded from selective possible data base assaults. Those models are obvious in assorted perspectives as they might be directing unprecedented issues with the information base security. We have dissected a network of the attacks on the off chance that you need to be attainable with its counter measures and its oversee techniques so as to be practical. Guaranteeing roughly realities base is large way of thinking for the arranging of unequivocal and request based absolutely records base security necessities. Progress of guaranteed about and customary realities base for scattered climate is an incredibly major trouble. The basic thought riding this evaluation to perceive indisputable security inconveniences which has been talented eventually of orchestrating of an understanding base for dissipated climate.

Article Details

Section
Public Law
Author Biography

CARMEN ELENA MANTILLA CABRERA, RUTH BARBA-VERA, LIGIA MARICELA NIAMA RIVERA, MARIA LORENA VILLACRÉS PUMAGUALLI

CARMEN ELENA MANTILLA CABRERA

Escuela Superior Politécnica de Chimborazo (ESPOCH)

RUTH BARBA-VERA

Escuela Superior Politécnica de Chimborazo (ESPOCH)

LIGIA MARICELA NIAMA RIVERA

Escuela Superior Politécnica de Chimborazo (ESPOCH)

MARIA LORENA VILLACRÉS PUMAGUALLI

Escuela Superior Politécnica de Chimborazo (ESPOCH)

 

References

“Security in Computing” 4th edition Mr.Charles P.Pfleeger-Pfleeger Consulting Group, Shari Lawrence Pfleeger.

Mr. Saurabh Kulkarni, Dr. Siddhaling Urolagin, Review of Attacks on Databases and Database Security Techniques, Facility International Journal of Engineering Technology and Database Security Techniques Research, Volume 2, Issue 11, November-2012.

Sohail IMRAN, Dr Irfan Hyder, Security Issues in Database, Second International Conference on Future Information Technology and Management Engineering, 2009.

E. Bertino and R. Sandhu. Database security - concepts, approaches, and challenges. Dependable and Secure Computing, IEEE Transactions on, 2(1):2–19, Jan.- March 2005.

E. B. Fernandez, K. Falkner, Securing Distributed systems using patterns: a survey, Computers and Security ,in press, http://dx.doi,org/10.1016/j.cose.2012.04.005

H. Zhou, X. Meng, L. Zhang, X. Oiao, Quorum systems for intrusion tolerance based on trusted timely computing base, Journal of Sys-tems, Engineering and Electronics, vol 21, no.1 pp.168-174,2010.

H. Hamdi, M.Mosbah, A DSL framework for policy based security of distributed systems, 3rd IEEE International Conference on Secure Software Integration and Reliability Improvements, pp.150-158, 2009.

Deepika, Nitasha Soni, Database Security: Threats and Security Techniques, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 5, May 2015.