TITLE

Database Security Best Practices

PUB. DATE
August 2005
SOURCE
Security: Solutions for Enterprise Security Leaders;Aug2005, Vol. 42 Issue 8, p32
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Provides tips for organizations on how to maintain database security. Assessment of the current of database security and establish a baseline for future comparisons; Understand vulnerabilities; Need to monitor progress to ensure baseline compliance and to evaluate the threat environment.
ACCESSION #
17837993

 

Related Articles

  • National Information Assurance Partnership.  // Network Dictionary;2007, p329 

    An encyclopedia entry for "National Information Assurance Partnership" or "NIAP" is presented. It is a cooperative agency that promotes information security (infosec) in public and private sectors in the U.S.

  • Spotlight DATA BREACH AT DISNEY.  // Network World;7/16/2007, Vol. 24 Issue 27, p6 

    The article reports on the data breach at Disney Movie Club in the U.S. Members have received letters informing them that their credit card information was sold by an employee of a Disney contractor to a federal agent as part of an undercover sting operation. Disney insists earlier notification...

  • Privacy on parade. Eder, Peter F. // Futurist;Jul/Aug94, Vol. 28 Issue 4, p38 

    Focuses on the importance of the establishment of safeguards against invasion of privacy through new technologies. Organizations' gathering of information and assembly of databases; Mischief of penetration of databases; Break-ins and misuse of Social Security data; Goals of the U.S. Privacy...

  • Securing your data. Vandagriff, David P. // ABA Journal;Jun94, Vol. 80 Issue 6, p58 

    Discusses the importance of computer data security. Solutions to the inadvertent or intentional loss of data; Ways on protecting information; Threats to data base security; Prevention of virus infection.

  • Reduce risks from Web and e-mail. Ryan, Denise // InfoWorld;08/07/2000, Vol. 22 Issue 32, p87 

    Focuses on the content security software used by companies to prevent data corruption and productivity loss.

  • PCI council adds Pin security to remit.  // Computer Weekly;9/25/2007, p10 

    The article reports that the PCI Security Standards Council has added Pin Entry Device (PED) security technology to its payments industry testing portfolio to streamline standardisation. The PED Security Requirements are designed to secure personal identification number (Pin)-based transactions...

  • Safety first.  // Director;Dec1997, Vol. 51 Issue 5, p63 

    Looks into developments which improves the security of data on a company's computer systems. Advantages of using Reflex Magnetics Disknet Data Vault; Function of Qsoftware's Aquila suite.

  • Economic espionage explosion.  // Security: Solutions for Enterprise Security Leaders;May98, Vol. 35 Issue 5, p14 

    Discusses the increasing breaches in information and physical security linked to competitive intelligence and corporate espionage in the United States. Diversity of espionage efforts; Trends responsible for the rise in computer-aided economic espionage; Measures for obtaining trade information;...

  • Information highway enlarges security loopholes on distributed systems. Coffee, Peter // PC Week;9/12/94, Vol. 11 Issue 36, pN/12 

    Discusses the security issue of computerized data on network. Different ways of data theft; Possible solutions; Vulnerability of security measures; Role of ISDN. INSET: Switched networks constitute new breed..

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics