Tuesday, July 23, 2019
Database security risks Term Paper Example | Topics and Well Written Essays - 750 words
Database security risks - Term Paper Example Also, this research will outline the main problems with the database privacy and security. Data and information are precious assets for any organization or business. ââ¬Å"Information refers to data that has been improved and structured by processing and purposeful intelligenceâ⬠(Whitten, Bentley, & Dittman, 2000, p. 45). Here, data refers to a basic explanation of events, things, persons, processes, and transactions that are collected, categorized, and stored, however they are not structured to convert any definite meeting. Data items include figures, numeric, alphanumeric, sounds, or images. A database encompasses data and information that are organized for retrieval (Turban, Leidner, McLean, & Wetherbe, 2005, p. 51) and (Laudon & Laudon, 1999, p. 7). According to (Stair & Reynolds, 2003), a database consists of organized collection of data and information. A database can include data and information on, workers, clients, inventory, sales information, competitors, online dealings, and so on (Stair & Reynolds, 2003, p. 17). A database is a most valuable asset for any organization which is necessary to run the business. Therefore, security of this asset is very necessary. Security consists of the guidelines, activities, and actions used to stop unlawful access or modification, theft, and physical damage to database (Laudon & Laudon, 1999, p. 502). Privacy refers to right of organizations and individuals to forbid or incarcerate the compilation and utilization of information about them. In addition, few years ago, information privacy was straightforward to maintain because information was stored in different locations, for instance, each business had its own acknowledgment files, and each government agency maintained detached records, doctors kept their own patient files. However, presently, huge databases store this data online. A large amount of this data is private and secret and should be reachable only to permitted users (Shelly, Cashman, & Vermaat,
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.