Ask a question from expert

Ask now

Database and Data Security: Assignment

17 Pages4993 Words155 Views
   

Added on  2021-06-15

Database and Data Security: Assignment

   Added on 2021-06-15

BookmarkShareRelated Documents
Running head: DATABASE AND DATA SECURITY Database and Data SecurityName of the StudentName of the Institution
Database and Data Security: Assignment_1
DATABASE AND DATA SECURITY 2PART AIntroductionThe advanced and the frequent use of information system has forced many organizations to look for alternative sources in terms of securing their data and databases from third parties (Lee, 2000). As a result, the need for data protection has become fundamental in order for the organization to work effectively. Data and database security has become a key challenge for many organizations due to cyber-attacks and security breaches. Many vendors have resorted to various techniques for safeguarding the organization sensitive data and thus reducing the data breaches significantly. Data masking is one of the imperative techniques that vendors use in ensuring the privacyand authorized access to sensitive data or databases (Radhakrishnan, Kharrazi, & Memon, 2005).This is the process of hiding sensitive data and exposing data that mimics the original data with the intention of encapsulating original data from third-party access. The exposed data is used to serve diverse intended purposes while ensuring the integrity of the sensitive data is kept untouched or unaltered. For instance, it can be used in software testing and training purposes. Key to note, it is not recommendable to use the original copy of data from such organization due to security attacks which could jeopardize organizational data and the entire database.Nowadays the sensitive data has become an integral part of on every organization and there is need to protect it from replication and usage in various activities and in different environments for training and testing because the exposure of sensitive data exposes the organization to cyber-related attacks (Gumpel, & Chaughule, 2010).It is therefore, essential for the organization to mitigate risk by deploying some practices which ensure the exposure of the
Database and Data Security: Assignment_2
DATABASE AND DATA SECURITY 3sensitive data is null and the organizational data and database are impeded from unnecessary access. Consequently, masking is used due to obfuscate the data and meet the compliance standard set the security regulatory bodies regarding with data security and intruders. Data masking involves the alteration of the real data and coming up with the data that resemble the same data which serves for different usage in the organization like software testing and training purposes (Ebrahimi, Hassan, Singh, Kuppuswamy, & Chidambaram, 2012).This allows the sensitive data from alteration or access by different users and the integrity of the data which serve as fundamental decision-making tool and organization is kept safe. Such exposures are prevented from using various methods suchas substitution of the data where applicable, encryptions and reshuffling of data or the database. These methods are chosen and based on the organization choice and preference. Data masking through these techniques denies any chance ofreverse engineering which may be used to reverse the existing data into its original form as a way of trying to gain unauthorized access (Pomroy, Lake, & Dunn, 2011).Use of real data in the testing environment poses many security breaches which many organizations are naïve. Consequently, they end up being experiencing frequently attacks. Gumpel & Chaughule (2010) reiterated that several business enterprises are constantly being attacked due to such novice use and allowing the use of their sensitive data and databases in testing and development phases of various softwares. The data used in this scenarios are totally plain and attack-prone Data breaches sometimes take place in software testing processes and takes different diverse forms which cannot be easily identified. Data breaches can be neglected although they enable the third part terrorize the organization by manipulating their data unknowingly. Computers and laptops handled by the third parties or the data or storage shared with the third parties act as through pass point for intruders and the organization will not evade
Database and Data Security: Assignment_3
DATABASE AND DATA SECURITY 4from security attack on their data. This has suggested the data masking which allows the simulation of data is mainly used for the testing process to avoid data breaches.User training, on the other hand, involves the use of data as a training tool. Use of real data while training staff and employees should be discouraged because research shows that most of the attacks on data are caused by the use of the organization data in facilitating training processes (Boukobza, 2014).Alternatively, the organization should embrace techniques of generating virtual data which can serve the same purposes as the original data in order to safeguard the organization from reckless attack. The simulation of data and the modification of the existing can be precisely used in training sessions thus preventing third party intrusion. The fictitious data is precisely advocated for use in training and testing processes because such data have no close relationship with the organization data thus eradicates the third party access.Data masking takes two forms- static and dynamic masking. The static data masking aimsat manipulating data that is in a stationary state whiledynamic data masking, on the other hand, is appliedto change the data that is in the mobile state and keepthe original data unchanged(Fergusson, 2006).These forms of data masking has been of great significance in combating data and database security breaches by denying unauthorized access of the data in thedatabase or the data that is shared in a communication situation. Both data security is essential and many organization which have implemented the two have mitigated the vulnerabilities of thedata breaches.The idea of the data masking has been recognized by the many organization as a form of security of their data and the organization entire database. The technique has been imperative to protecting the data using the methods and has boosted the security concerns of the organization. Cisco, however, recognized this concept of data masking in order to protect their data and
Database and Data Security: Assignment_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security Assignment | Voter Records Breach
|10
|2492
|149

Talent Management Plan for Bupa Corporation
|10
|2295
|58

IT Security Challenges in Organizations
|8
|1966
|27

Cyber Security: Policies, Training, Detection, Assessment, Recovery
|10
|1480
|414

Security Risk Analysis
|4
|763
|256

Professional Skills In Information Communication Technology: Cyber Security
|20
|6717
|27