Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Download
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword
Like this
1Activity
×
0 of .
Results for:
No results containing your search query
P. 1
Week14 - Security

Week14 - Security

Ratings: (0)|Views: 123|Likes:

More info:

Categories:Types, School Work
Published by: Muhammad Asghar Khan on Dec 14, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, PPT, TXT or read online from Scribd
See More
See less

08/23/2012

pdf

text

original

 
1
Database II
Database Security
 
Muhammad Asghar Khan
 
2
Database Security (1/2)
The protection of the database against threats using both technical and administrative controls
Database security includes hardware, software, peopleand data
A database security can be consider in the followingsituations:
Theft and fraudLoss of confidentiality (Secrecy)Loss of privacyLoss of integrityLoss of availability
 
3
Database Security (2/2)
Threat
Any situation or event, whether intentional or un-intentional, that will adversely affect a system andconsequently an organizationFollowing are some of the examples of threats
Unauthorized amendment of dataIllegal entry by hacker Data corruption due to power loss or usageIntroduction of viruses

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->