Professional Documents
Culture Documents
COM 508 Discussion8
COM 508 Discussion8
in software security.
Database security refers to methods for safeguarding database management systems from
malicious cyber-attacks and unlawful access. Database security procedures are intended to
protect the data in the database, the data management system, and any applications that access
it against unauthorized access, damage, or infiltration. Due to its fundamental importance,
data protection is an essential component of business security. Data security must be the
primary goal of every database management system (DBMS), often known as database
security.
Injections into SQL Server are a type of attack in which malicious code is injected into
frontend (web) applications before being sent to the backend database. SQL injections provide
criminals complete access to any data stored in a database.
Insufficient Audit Trail:
If a database isn't audited, it runs the risk of breaking sensitive data protection laws on a
national and international level. All database events must be logged and registered
automatically, and automated auditing methods must be used.
Internal Security Threats:
A security risk posed by one of the three sources described below, each of which has
privileged access to the database, is known as an insider threat:
An opportunistic insider with bad motives
Inside the company, a rash employee leaves the database vulnerable to assault.
Human-caused Errors:
Over half of all reported data breaches are still caused by weak passwords, password sharing,
inadvertent data deletion or corruption, and other unwanted human activities.
Databases are penetrated and leaked as a result of non-technical staff's lack of IT security
knowledge and education, which may break basic database security requirements and put
databases at risk.
Malware is a type of software that is designed to tamper with your data or harm your
databases. Malware could infect your system via any endpoint device connected to the
database's network and take advantage of flaws.
References:-Maurer, R. (2021, July 7). Top Database Security Threats and How to Mitigate
Them. SHRM. https://www.shrm.org/resourcesandtools/hr-topics/risk-management/pages/top-
database-security-threats.aspx