Database Security Best Practices
- National Information Assurance Partnership. // Network Dictionary;2007, p329
An encyclopedia entry for "National Information Assurance Partnership" or "NIAP" is presented. It is a cooperative agency that promotes information security (infosec) in public and private sectors in the U.S.
- Spotlight DATA BREACH AT DISNEY. // Network World;7/16/2007, Vol. 24 Issue 27, p6
The article reports on the data breach at Disney Movie Club in the U.S. Members have received letters informing them that their credit card information was sold by an employee of a Disney contractor to a federal agent as part of an undercover sting operation. Disney insists earlier notification...
- Privacy on parade. Eder, Peter F. // Futurist;Jul/Aug94, Vol. 28 Issue 4, p38
Focuses on the importance of the establishment of safeguards against invasion of privacy through new technologies. Organizations' gathering of information and assembly of databases; Mischief of penetration of databases; Break-ins and misuse of Social Security data; Goals of the U.S. Privacy...
- Securing your data. Vandagriff, David P. // ABA Journal;Jun94, Vol. 80 Issue 6, p58
Discusses the importance of computer data security. Solutions to the inadvertent or intentional loss of data; Ways on protecting information; Threats to data base security; Prevention of virus infection.
- Reduce risks from Web and e-mail. Ryan, Denise // InfoWorld;08/07/2000, Vol. 22 Issue 32, p87
Focuses on the content security software used by companies to prevent data corruption and productivity loss.
- PCI council adds Pin security to remit. // Computer Weekly;9/25/2007, p10
The article reports that the PCI Security Standards Council has added Pin Entry Device (PED) security technology to its payments industry testing portfolio to streamline standardisation. The PED Security Requirements are designed to secure personal identification number (Pin)-based transactions...
- Information highway enlarges security loopholes on distributed systems. Coffee, Peter // PC Week;9/12/94, Vol. 11 Issue 36, pN/12
Discusses the security issue of computerized data on network. Different ways of data theft; Possible solutions; Vulnerability of security measures; Role of ISDN. INSET: Switched networks constitute new breed..
- How Vulnerable Are We? McKendrick, Joe // Database Trends & Applications;Oct2003, Vol. 17 Issue 10, p1
Reports on the vulnerability of database management systems to worms and viruses. Spread of the Slammer worm; Other classes of threats to databases; Types of security breach against databases faced by database managers.
- Beyond Firewalls. Singh, A.J. // Siliconindia;Apr2003, Vol. 7 Issue 3, p26
Discusses the effectiveness of firewalls in defending corporate systems against computer hackers. Essence of application security to secure an enterprise; Difficulty of administering database security for applications with multiple databases; Requirement for the applications to have centralized...