Here is the synopsis of our sample research paper on Protecting Databases. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This 12 page paper delves into Internet security issues as it concerns the integrity of databases. Database security is discussed in depth. Authentication is a large part of the discussion along with the problem of using back doors. Solutions are explored.
Bibliography lists 6 sources.
Page Count:
12 pages (~225 words per page)
File: RT13_SA129sec.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
up solely based on their ability to thrive in an online environment. While the net has been good to most businesses, every company faces greater security risks as a result.
With so much data available at the click of a mouse, there are real threats and concerns that were not previously present. The integrity of the company database is of
course of the utmost concern. Some companies have endured public relations and logistical nightmares after hackers were able to breach security. Thus, the
security of the database should be high in terms of priority for any company, whether or not the Internet supports their main type of transactions. Databases can be compromised from
within company walls too. It is important to note that a secure database must meet additional standards in terms of availability, integrity
and confidentiality (Spalka and Cremers 67). A secure database is generally thought to be an extension to an open database and should be representative of an image for a secure
real-world section (67). Confidentiality demands will inevitably crop up in many situations and while some are dictated by the law, others are
simply company preference (Spalka and Cremers 67). Thus, in evaluating the need for security in databases, many issues will be broached. What type of company is it that needs protection?
Is the data sensitive? For example, might data contain personal, guarded information such as the medical records of a celebrity, or is the data more general, where no serious consequences
will arise if the information is leaked? When designing types of security for databases, the extent and expense a firm goes to does
...