Database Security Best Practices

August 2005
Security: Solutions for Enterprise Security Leaders;Aug2005, Vol. 42 Issue 8, p32
Trade Publication
Provides tips for organizations on how to maintain database security. Assessment of the current of database security and establish a baseline for future comparisons; Understand vulnerabilities; Need to monitor progress to ensure baseline compliance and to evaluate the threat environment.


Related Articles

  • National Information Assurance Partnership.  // Network Dictionary;2007, p329 

    An encyclopedia entry for "National Information Assurance Partnership" or "NIAP" is presented. It is a cooperative agency that promotes information security (infosec) in public and private sectors in the U.S.

  • Spotlight DATA BREACH AT DISNEY.  // Network World;7/16/2007, Vol. 24 Issue 27, p6 

    The article reports on the data breach at Disney Movie Club in the U.S. Members have received letters informing them that their credit card information was sold by an employee of a Disney contractor to a federal agent as part of an undercover sting operation. Disney insists earlier notification...

  • Privacy on parade. Eder, Peter F. // Futurist;Jul/Aug94, Vol. 28 Issue 4, p38 

    Focuses on the importance of the establishment of safeguards against invasion of privacy through new technologies. Organizations' gathering of information and assembly of databases; Mischief of penetration of databases; Break-ins and misuse of Social Security data; Goals of the U.S. Privacy...

  • Securing your data. Vandagriff, David P. // ABA Journal;Jun94, Vol. 80 Issue 6, p58 

    Discusses the importance of computer data security. Solutions to the inadvertent or intentional loss of data; Ways on protecting information; Threats to data base security; Prevention of virus infection.

  • Reduce risks from Web and e-mail. Ryan, Denise // InfoWorld;08/07/2000, Vol. 22 Issue 32, p87 

    Focuses on the content security software used by companies to prevent data corruption and productivity loss.

  • PCI council adds Pin security to remit.  // Computer Weekly;9/25/2007, p10 

    The article reports that the PCI Security Standards Council has added Pin Entry Device (PED) security technology to its payments industry testing portfolio to streamline standardisation. The PED Security Requirements are designed to secure personal identification number (Pin)-based transactions...

  • Information highway enlarges security loopholes on distributed systems. Coffee, Peter // PC Week;9/12/94, Vol. 11 Issue 36, pN/12 

    Discusses the security issue of computerized data on network. Different ways of data theft; Possible solutions; Vulnerability of security measures; Role of ISDN. INSET: Switched networks constitute new breed..

  • How Vulnerable Are We? McKendrick, Joe // Database Trends & Applications;Oct2003, Vol. 17 Issue 10, p1 

    Reports on the vulnerability of database management systems to worms and viruses. Spread of the Slammer worm; Other classes of threats to databases; Types of security breach against databases faced by database managers.

  • Beyond Firewalls. Singh, A.J. // Siliconindia;Apr2003, Vol. 7 Issue 3, p26 

    Discusses the effectiveness of firewalls in defending corporate systems against computer hackers. Essence of application security to secure an enterprise; Difficulty of administering database security for applications with multiple databases; Requirement for the applications to have centralized...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics