Database Security Management

Lesson Transcript
Instructor: Temitayo Odugbesan

Temitayo has 11+ years Industrial Experience in Information Technology and has a master's degree in Computer Science.

Database security management is the practice of ensuring the safety and reliability of the protective measures surrounding data storage. Look at examples of real-world businesses that manage database security and examine some commonly seen threats. Updated: 12/28/2021

What Is Database Security Management?

Every asset of value needs protection for example, a piece of land, a house, money, or precious stones. Data is an asset and is no different.

Data can be described as anything that can be understood by humans or machine. This could range from personal files, banking details, and intellectual property to government classified files. It is collected, retained and shared from within a database system.

Its value is measured by its accuracy, consistency, usability, relevance and availability. Modernization today has its foundations built on secure data and database systems. Births, deaths, education, immigration, banks, social security are just a few systems built on databases.

Imagine a bank, Harbor Deck Bank Ltd (HDB Ltd), with a customer base of about 4000. None of the bank staff has the mental capacity to memorize the account balances of any of the bank's numerous customers. From the shareholders to the clerk, the bank's reputation and survival as a whole depend on the reliability of its data, database systems, and connected bank platforms.

The bank keeps track of every transaction, maintaining correct balances in the accounts. With the bank's customers' purchasing power running from a few dollars to billions of dollars, unreliable data and poor database security, opens the doors to security breaches which could result in lawsuits, frauds, theft, data exposure, and malicious attacks all at the same time. Securing a database is very important.

Database security management refers to the collection of processes and procedures used to protect and secure a database or database management software from illegitimate activity and use, malicious threats, and attacks.

An error occurred trying to load this video.

Try refreshing the page, or contact customer support.

Coming up next: Information Security: Basic Principles

You're on a roll. Keep up the good work!

Take Quiz Watch Next Lesson
Your next lesson will play in 10 seconds
  • 0:03 What Is Database…
  • 1:54 Threats to Database Security
  • 3:59 Forms
  • 6:27 Lesson Summary
Save Save Save

Want to watch this again later?

Log in or sign up to add this lesson to a Custom Course.

Log in or Sign up

Speed Speed

Threats to Database Security

Threats to the database security increase daily with the advent of newer and modern ways of managing data related transactions. Through the use of exploits, these transactions are susceptible to threats from the following:

The Internet: Today, the widely used internet has facilitated the dynamic growth and transmission of data. Internet banking platforms are convenient for Harbor Deck Banking Ltd customers, but this has expanded the bank's database coverage and opened it up to a spectrum of potential threats. As a result of this, the bank's data is under constant threats such as malware, viruses, and SQL injection attacks.

Hackers: These are deliberate attacks by individuals using expert computer skills to illegally access a computer system. Their motives include theft, fraud, and organizational sabotage. If a hacker is successful, customers' personal information or account details can be stolen and exposed.

Fraud: Individuals attempt to gain illegal access to data with the intention of making financial or personal gains from the information. If Harbor Deck Banking Ltd suffers a security breach, the data could be copied and sold. For example, fraudsters could use customer data to create cloned banking cards to carry out unauthorized financial transactions.

Human Negligence: There is hardly a technology-based system that completely lacks a human interface. Expertise is required to properly implement the necessary security controls and ensure security policies are enforced.

As a bank, Harbor Deck Banking Ltd has closed circuit TV security cameras installed with a full complement of alarm systems to monitor and secure its premises both during and at the close of business. These systems have to be constantly monitored and kept live…by humans! This is no different when it comes to their database systems. Experts need to recognize security threats and breaches early and immediately identify system weaknesses and loopholes to prevent further damage to the institution.

To unlock this lesson you must be a Member.
Create your account

Register to view this lesson

Are you a student or a teacher?

Unlock Your Education

See for yourself why 30 million people use

Become a member and start learning now.
Become a Member  Back
What teachers are saying about
Try it now
Create an account to start this course today
Used by over 30 million students worldwide
Create an account