|
|
|
|
|
Design and implementation of multi-layer policies for database security |
|
PP: 147-153 |
|
Author(s) |
|
Ayman Mohamed Mostafa,
Mohamed Hashem Abdel-Aziz,
Ibrahim Mahmoud El-Henawy,
|
|
Abstract |
|
The security of database depends on a set of systems, roles, procedures, and processes that protect the entire database from
unintended activities. Unintended activities can be categorized as authenticated misuse, malicious attacks or inadvertent mistakes made
by authorized users. If any intruder succeeds in attacking the system network, the database security will be the last line of defense
in protecting confidentiality, availability, and integrity. This paper presents interactive multi-layer policies for securing relational
database that lies on the server side, monitor authorized users who may misuse their privileges on the client side, and monitor
database administrators who may use their multiple privileges to penetrate the security system. These multi-layer policies can be
combined together to create a defense system that puts the intruder under pressure at all security levels in order to protect integrity and
confidentiality of database. |
|
|
|
|
|