Monday, April 29, 2019
Database security issues Research Paper Example | Topics and Well Written Essays - 1250 words
Database shelter emergences - Research Paper ExampleThe paper analyzes security issues concerning both web based and traditional databases.Database illation is a security issue that multi level databases are prone to. Inference stub be defined as the process in which a user can infer restricted information from results of queries. Typically, inference occurs when a user at a turn down security level is able to put together trivial information admission chargeible at that level to deduce a fact that requires a higher security clearance to access. To be able to access the higher security level information, a user may exploit correlated data. If for instance a user can access the values of H and K, then for a case whereby Z=H*K, the user can correctly infer the value Z even without security clearance. Another inference channel is missing data. When a user receives null values when querying certain fields, the restricted information can be inferred. A practical shell is when a u ser cannot slot in a conflict and yet the space is not yet reserved. Through cross-referencing, it can be known that some accede is already stored in the given field. Another aspect of the inference problem is caused by value constraints. For example if attribute Y is not classified and X is secret with the constraint X+Y100, the value of X can be inferred finished a query. A technique to remedy the inference problem is through polyinstantiation. This is a relationship whereby elements of a given attribute are associated but have multiple autonomous instances of instantiation. This may end up creating a new problem of double records in the long run. harmonize to Natan (2003), the entries may result in major problems if the database is for mission critical systems like airliners.The other security issue is SQL Injection. This refers to a scenario whereby unauthorized MySQL statement is run on a database. This technique takes advantage of un-validated user foreplay vulnerability t o pass commands from a web
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.