You are on page 1of 1

Discuss one of the concepts presented in this module and why it is important

in software security.
Database security refers to methods for safeguarding database management systems from
malicious cyber-attacks and unlawful access. Database security procedures are intended to
protect the data in the database, the data management system, and any applications that access
it against unauthorized access, damage, or infiltration. Due to its fundamental importance,
data protection is an essential component of business security. Data security must be the
primary goal of every database management system (DBMS), often known as database
security.

The breach could be caused by a variety of software defects, misconfigurations, or habits of


misuse or incompetence. Some of the most well-known causes and types of database security
cyber hazards are listed below

Injections into SQL Server are a type of attack in which malicious code is injected into
frontend (web) applications before being sent to the backend database. SQL injections provide
criminals complete access to any data stored in a database.
Insufficient Audit Trail:
If a database isn't audited, it runs the risk of breaking sensitive data protection laws on a
national and international level. All database events must be logged and registered
automatically, and automated auditing methods must be used.
Internal Security Threats:
A security risk posed by one of the three sources described below, each of which has
privileged access to the database, is known as an insider threat:
An opportunistic insider with bad motives
Inside the company, a rash employee leaves the database vulnerable to assault.

Human-caused Errors:
Over half of all reported data breaches are still caused by weak passwords, password sharing,
inadvertent data deletion or corruption, and other unwanted human activities.

Databases are penetrated and leaked as a result of non-technical staff's lack of IT security
knowledge and education, which may break basic database security requirements and put
databases at risk.
Malware is a type of software that is designed to tamper with your data or harm your
databases. Malware could infect your system via any endpoint device connected to the
database's network and take advantage of flaws.

References:-Maurer, R. (2021, July 7). Top Database Security Threats and How to Mitigate
Them. SHRM. https://www.shrm.org/resourcesandtools/hr-topics/risk-management/pages/top-
database-security-threats.aspx

You might also like