Ginni has Published 1522 Articles

What are the security issues in mobile database environment?

Ginni

Ginni

Updated on 07-Mar-2022 09:59:15

369 Views

There are some security issues in mobile database environment which are as follows −Data Security in mobile data transfer − Disconnections appear of ten in wireless communication. They can be forced by the user because of storing communication costs or be persuaded by faults. This situation can expose the data ... Read More

What are the major issues in multilevel security based on distributed security manager?

Ginni

Ginni

Updated on 07-Mar-2022 09:56:55

542 Views

There are several issues in in multilevel security based on distributed security manager which are as follows −Authentication − User authentication is the basic line of defence for mobile and handheld devices including Personal Digital Assistants (PDAs). Traditional authentication structure rely on supporting a centralized database of user identities, making ... Read More

What are the techniques of database security in information security?

Ginni

Ginni

Updated on 07-Mar-2022 09:54:51

1K+ Views

There are various techniques of database security which are as follows −Secure network connection − The mobile database and the main database have to be synchronized at definite times. The synchronization is performed in the system software of the mobile database and is implemented over the http protocol.Encrypted local database ... Read More

What are the strategy of mobile database system in information security?

Ginni

Ginni

Updated on 07-Mar-2022 09:52:54

351 Views

There are various strategy of mobile database system which are as follows −Perfecting the Authentication Mechanism − It can avoid illegal terminal access deceptively and background information can be damaged, it is required for identity authentication, when mobile user and service database operating synchronous in the mobile database system.When it ... Read More

What is Mobile Database Security in information security?

Ginni

Ginni

Updated on 07-Mar-2022 09:51:20

1K+ Views

A mobile database is said to be a database that can be related to by a mobile computing device over a mobile network .The client and server include wireless connections. A cache is maintained to hold recurrent information and transactions so that they are not lost due to connection failure.A ... Read More

What is the need of database security in information security?

Ginni

Ginni

Updated on 07-Mar-2022 09:49:15

3K+ Views

Database security contains securing the database from permitted access, alteration or elimination. Because the database defines an essential corporate resource, database security is an essential subcomponent of some organization’s complete information system security plan.Moreover the requirement to keep and secure information for the smooth services of the organization, database designers ... Read More

What are the drawbacks of database security?

Ginni

Ginni

Updated on 07-Mar-2022 09:47:48

538 Views

Database security defines the collective measures used to protect and secure a database or database management software from unauthorized use and malicious cyber threats and attacks. Database security is a layer of information security. It is basically concerned with physical protection of information, encryption of data in storage and data ... Read More

What are the levels of database security in information security?

Ginni

Ginni

Updated on 07-Mar-2022 09:46:09

2K+ Views

Data security defines the process of protecting data from unauthorized access and data corruption throughout its lifecycle. Data security involves data encryption, hashing, tokenization, and key administration practices that secure data across some applications and platforms.Security database professionals have to depend on network management for implementing firewalls or other structure ... Read More

What is the principles of database security in information security?

Ginni

Ginni

Updated on 07-Mar-2022 09:44:01

1K+ Views

Database security defines the collective measures used to protect and secure a database or database management software from unauthorized use and malicious cyber threats and attacks. There are various principles of database security which are as follows −Security models − A security model creates the external element for the examination ... Read More

What are the types of threats in a database?

Ginni

Ginni

Updated on 07-Mar-2022 09:33:26

749 Views

There are various types of threats which are as follows −Unauthorised modification − It can be changing data values for reasons of sabotage, crime or ignorance which can be allowed by inadequate security structure, or sharing of passwords or password guessing.Unauthorised disclosure − When the information should not have been ... Read More

Advertisements