Copyright

Database Security Management

An error occurred trying to load this video.

Try refreshing the page, or contact customer support.

Coming up next: Information Security: Basic Principles

You're on a roll. Keep up the good work!

Take Quiz Watch Next Lesson
 Replay
Your next lesson will play in 10 seconds
  • 0:03 What Is Database…
  • 1:54 Threats to Database Security
  • 3:59 Forms
  • 6:27 Lesson Summary
Add to Add to Add to

Want to watch this again later?

Log in or sign up to add this lesson to a Custom Course.

Login or Sign up

Timeline
Autoplay
Autoplay
Speed

Recommended Lessons and Courses for You

Lesson Transcript
Instructor: Temitayo Odugbesan

Temitayo has 11+ years Industrial Experience in Information Technology and has a master's degree in Computer Science.

For data to be secure all the systems around the data should be secured. In this lesson, we'll learn about the threats to database systems today and the processes and procedures used to protect the confidentiality of a database system.

What Is Database Security Management?

Every asset of value needs protection for example, a piece of land, a house, money, or precious stones. Data is an asset and is no different.

Data can be described as anything that can be understood by humans or machine. This could range from personal files, banking details, and intellectual property to government classified files. It is collected, retained and shared from within a database system.

Its value is measured by its accuracy, consistency, usability, relevance and availability. Modernization today has its foundations built on secure data and database systems. Births, deaths, education, immigration, banks, social security are just a few systems built on databases.

Imagine a bank, Harbor Deck Bank Ltd (HDB Ltd), with a customer base of about 4000. None of the bank staff has the mental capacity to memorize the account balances of any of the bank's numerous customers. From the shareholders to the clerk, the bank's reputation and survival as a whole depend on the reliability of its data, database systems, and connected bank platforms.

The bank keeps track of every transaction, maintaining correct balances in the accounts. With the bank's customers' purchasing power running from a few dollars to billions of dollars, unreliable data and poor database security, opens the doors to security breaches which could result in lawsuits, frauds, theft, data exposure, and malicious attacks all at the same time. Securing a database is very important.

Database security management refers to the collection of processes and procedures used to protect and secure a database or database management software from illegitimate activity and use, malicious threats, and attacks.

Threats to Database Security

Threats to the database security increase daily with the advent of newer and modern ways of managing data related transactions. Through the use of exploits, these transactions are susceptible to threats from the following:

The Internet: Today, the widely used internet has facilitated the dynamic growth and transmission of data. Internet banking platforms are convenient for Harbor Deck Banking Ltd customers, but this has expanded the bank's database coverage and opened it up to a spectrum of potential threats. As a result of this, the bank's data is under constant threats such as malware, viruses, and SQL injection attacks.

Hackers: These are deliberate attacks by individuals using expert computer skills to illegally access a computer system. Their motives include theft, fraud, and organizational sabotage. If a hacker is successful, customers' personal information or account details can be stolen and exposed.

Fraud: Individuals attempt to gain illegal access to data with the intention of making financial or personal gains from the information. If Harbor Deck Banking Ltd suffers a security breach, the data could be copied and sold. For example, fraudsters could use customer data to create cloned banking cards to carry out unauthorized financial transactions.

Human Negligence: There is hardly a technology-based system that completely lacks a human interface. Expertise is required to properly implement the necessary security controls and ensure security policies are enforced.

As a bank, Harbor Deck Banking Ltd has closed circuit TV security cameras installed with a full complement of alarm systems to monitor and secure its premises both during and at the close of business. These systems have to be constantly monitored and kept live…by humans! This is no different when it comes to their database systems. Experts need to recognize security threats and breaches early and immediately identify system weaknesses and loopholes to prevent further damage to the institution.

To unlock this lesson you must be a Study.com Member.
Create your account

Register to view this lesson

Are you a student or a teacher?

Unlock Your Education

See for yourself why 30 million people use Study.com

Become a Study.com member and start learning now.
Become a Member  Back
What teachers are saying about Study.com
Try it risk-free for 30 days

Earning College Credit

Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Create an account to start this course today
Try it risk-free for 30 days!
Create An Account
Support