International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 120

Review Papers | Computer Science & Engineering | Nigeria | Volume 6 Issue 8, August 2017


Database Security Issues: A Review

Ogbonna J. C., Nwokoma F. O., Ejem A.


Abstract: Database security such as confidentiality, integrity, and availability of data/information stored in a database is one of the most crucial and major challenges in the world of Information and Communication Technology. Inaccuracy/Loss of data stored in a database in some cases may be regarded as a loss of human life. That is to say that, database may provide false information that could render the entire organization hopeless if not well protected, and so techniques that protects database from attackers, and any kind of corruption should be carefully implemented and should be given a higher priority. The major factors to consider in database security issues include how to prevent unauthorized access to data, how to prevent unauthorized manipulation of data, as well as how to insure the availability of data when needed. This paper aims at reviewing various database security issues such as data confidentiality requirements, data integrity requirements, and data availability requirements.


Keywords: Database security, security techniques, database integrity, database threats


Edition: Volume 6 Issue 8, August 2017,


Pages: 1812 - 1816


How to Cite this Article?

Ogbonna J. C., Nwokoma F. O., Ejem A., "Database Security Issues: A Review", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART20176415, Volume 6 Issue 8, August 2017, 1812 - 1816

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Database security'

Downloads: 106

Comparative Studies, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 193 - 195

Application for Detecting and Preventing SQL Injection Attacks using Web Service

Anuja A. Patil, Ketaki H. Pangu

Share this Article

Downloads: 108 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 242 - 245

An Approach to Detect and Prevent SQL Injection Attacks using Web Service

Shabnam R. Makanadar, Vaibhav V. Solankurkar

Share this Article

Similar Articles with Keyword 'security techniques'

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2386 - 2390

GMFAD and CDAL-M Models for Identification of Adversary Attacks in Wireless Sensor Network using RSS

Santosh S. Doifode, D. C. Mehetre

Share this Article

Similar Articles with Keyword 'Database'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 886 - 889

Survey on Algorithms Predicting Performance of Keyword Queries

Snehal Borole

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 716 - 720

A Comprehensive Study of Elasticsearch

Nikita Kathare, O. Vinati Reddy, Dr. Vishalakshi Prabhu

Share this Article

Similar Articles with Keyword 'security'

Downloads: 115 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 134 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article
Top