International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 134 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 4, April 2014


A Review on Database Security

Tejashri R. Gaikwad | A. B. Raut [2]


Abstract: Protecting data is at the heart of many secure systems, and many users rely on a database management system to manage the protection. This paper is all about the security of database management systems, as an example of how application security can be designed and implemented for specific task. There is substantial current interest in DBMS Security because databases are newer than the programming and operating systems. Databases are essential to many business and government organizations, to make the retrieval and maintenance of data easy and efficient it is stored in a database. Database organization and contents are considered valuable corporate assets that must be carefully protected because databases are a favorite target for attackers. The basic security requirements of database system are not unlike those of other computing system. The basic problems are access control, exclusion of spurious data, authentication of users and reliability. In this paper the challenges and threats in database security are identified.


Keywords: Attack, Database security, Threat, Integrity


Edition: Volume 3 Issue 4, April 2014,


Pages: 372 - 374


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Tejashri R. Gaikwad, A. B. Raut, "A Review on Database Security", International Journal of Science and Research (IJSR), Volume 3 Issue 4, April 2014, pp. 372-374, https://www.ijsr.net/get_abstract.php?paper_id=20131277

Similar Articles with Keyword 'Attack'

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar | Mohan K [18]

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 629 - 634

A Face Spoof Detection using Feature Extraction and SVM

Lovely Pal [2] | Renuka Singh [2]

Share this Article
Top