A Review of Database Security Concepts, Risks, and Problems

Currently, data production is as quick as possible; however, databases are collections of well-organized data that can be accessed, maintained, and updated quickly. Database systems are critical to your company because they convey data about sales transactions, product inventories, customer profiles...

Full description

Saved in:
Bibliographic Details
Published inUHD Journal of Science and Technology Vol. 5; no. 2; pp. 38 - 46
Main Author Teimoor, Ramyar Abdulrahman
Format Journal Article
LanguageEnglish
Published University of Human Development 10.10.2021
Subjects
Online AccessGet full text
ISSN2521-4209
2521-4217
DOI10.21928/uhdjst.v5n2y2021.pp38-46

Cover

Loading…
More Information
Summary:Currently, data production is as quick as possible; however, databases are collections of well-organized data that can be accessed, maintained, and updated quickly. Database systems are critical to your company because they convey data about sales transactions, product inventories, customer profiles, and marketing activities. To accomplish data manipulation and maintenance activities the Database Management System considered. Databases differ because their conclusions based on countless rules about what an invulnerable database constitutes. As a result, database protection seekers encounter difficulties in terms of a fantastic figure selection to maintain their database security. The main goal of this study is to identify the risk and how we can secure databases, encrypt sensitive data, modify system databases, and update database systems, as well as to evaluate some of the methods to handle these problems in security databases. However, because information plays such an important role in any organization, understanding the security risk and preventing it from occurring in any database system require a high level of knowledge. As a result, through this paper, all necessary information for any organization has been explained; in addition, also a new technological tool that plays an essential role in database security was discussed.
ISSN:2521-4209
2521-4217
DOI:10.21928/uhdjst.v5n2y2021.pp38-46