Skip to main content

Importance of Database Security

Database security is highly important because it prevents data loss, leakage, or unauthorized access to sensitive data. A few of many ways to secure a database is by making sure the hosting machine is housed, secured, locked and monitored to prevent unauthorized entry, access or theft. Apart from physical security the database should have firewalls implemented with default rules to deny all traffic, only opened to specific applications or web servers.

User database roles and management is another security need of a database system. This implements access to only authorized users, and minimal permissions are given to each job function. Database backup and recovery is another important piece of database security. This prevents data loss keeping a copy of the database when in need. Keeping backup and recovery procedures documented and periodically is a good practice. Another security need of a database is encryption and key management,  allowing data to be encrypted during transmission over the network, minimizing data exposure if intercepted or misrouted.

Sources:

https://security.berkeley.edu/resources/best-practices-how-articles/database-hardening-best-practices

https://docs.oracle.com/cd/A58617_01/server.804/a58396/ch1.htm

Comments

Popular posts from this blog

Your Online Life, Permanent As a Tattoo

View TED Talk Link Watching this TED talk titled “Your Online Life, Permanent As a tattoo” talks about how the use of social media can be the same as having a personal tattoo. Juan Enriquez, the main speaker, begins the presentation by using visual pictures of what tattoos can represent in a person's life. Using pictures, he shows the audience that tattoos can be beautiful, intriguing, intimate and also builds humor by stating that they can be mistakes. After showing the audience these different types of tattoos, he starts to question them about what if social sites and services were to become personal tattoos. At this point he begins to add more information on how the way we express ourselves on  social media can impact and create our  “Electronic Tattoo”. Juan states how difficult it is to get away from our electronic tattoos, since forms of technology, like facial recognition are getting better and better at recognizing people's faces. He adds up that if someone...

How variables and properties work/compare.

Variables are storage locations that data can be stored in. They are are a way of naming data locations that can be later on used in the program. Variables generally have four attributes: an identifier, data location, type and value.  We have used variables in most of our programs in class, for example, storing names as strings and numbers as doubles/ints. Properties on the other hand can be looked as a special type of method that exposes a variable. A property can have can have a Get procedure (read only), a Set procedure (write only), or both (read-write). Properties are effective in a way that they have access to private data inside of a class, and can manipulate the data as it enters or leaves the class. Variables and properties are both important in programming because they help store and manipulate data. Variables can be used to store and protect important user data inside of classes, and the property of those variables help manage what data is only going out into outsid...

Modular Programming

Modular programming is the practice of breaking down a program's functionality into independent interchangeable modules. Each of these modules have everything necessary to execute only that aspect of the desired functionality, in the case they are needed.  Modular programming is important because it creates a structure that keeps the code organized and easier to maintain. For example, if you had to change an object used throughout a program, with modular programming you would only have to find the module where the character was coded. Compared to not having modularization, if you wanted to accomplish this you would be required to read the code line by line having to find and edit that character everywhere it was used. Programming languages like C#, java, and C have this implemented by having different methods or identifiers. Once that is created then you are able to use those methods elsewhere in your code, which also saves time by not having to re-write the method all over ag...